Unexpected access to resources

Accesses to a protected system resource are either being unexpectedly granted or denied. It is always wise to first validate the ISAM processes are started and running normally.

Also check to ensure the ISAM message log files do not flag any operational problems. If ISAM seems operationally sound, the problem is likely due to the policies that have been defined and applied to that system resource.

There are three ISAM policy mechanisms that can be used to control access to your protected resources: ACLs, POPs, and authorization rules. Use the pdadmin commands to learn which ACL in the protected object space hierarchy has control over the access to the protected resource.

Parent topic: Common Security Verify Access problems