Access control lists and protected object policies
Security administrators define and apply the access control list (ACL) and protected object policy (POP) to protect resources in the ISAM system. These rules are applied to the object representations of the resources in the protected object space. The ISAM authorization service authorizes decisions based on the policies applied to these objects. When a requested operation on a protected object is permitted, the application responsible for the resource implements it. One policy can dictate the protection parameters of many objects. Any change to the rule affects all objects to which the ACL or POP is attached.
Parent topic: Security concepts for a WebSEAL deployment