Administer protected objects and protected object spaces

We can use the administration API to create, modify, examine, list, and delete Security Verify Access protected objects. These protected objects represent resources that must be secured to enforce your security policy. We can specify the security policy by applying access control lists (ACLs), protected object policies (POPs) , and authorization rules to the protected objects. ISAM protected objects exist within a virtual hierarchy known as a protected object space. ISAM provides several protected object spaces by default. We can use the administration API to define new regions of the protected object space and to define and secure resources specific to a third-party application.

Parent topic: Administration Java Developer Reference