Protected object policy management

The access control list (ACL) policies provide the authorization service with information to make a yes or no answer on a request to access a protected object and do some operation on that object. A protected object policy (POP) contains additional conditions on the request. The conditions are passed back to the resource manager along with the yes ACL policy decision from the authorization service.

It is the responsibility of ISAM and the resource manager to enforce the POP conditions.

Available attributes for a POP that are provided by ISAM.

POP attribute Description
Name Name of the policy. This attribute relates to the pop-name variable in the pop command documentation.
Description Descriptive text for the policy. This attribute occurs in the pop show command.
Warning mode Provides administrators a means to test ACLs, POPs, and authorization rules. Warning mode provides a way to test the security policy before it is made active.
Audit level Type of auditing: all, none, successful access, denied access, or errors. Audit level informs the authorizations service that extra services are required when permitting access to the object.
Time-of-day Access Day and time restrictions for successful access to the protected object. Time-of-day places restrictions on the access to the object.
IP endpoint authorization method policy Specifies authorization requirements for access from members of external networks. The IP endpoint authentication method policy places restrictions on the access to the object.
EAS trigger attributes Specifies an External Authorization Service (EAS) plug-in that is started to make an authorization decision with the externalized policy logic of the customer.
Quality of Protection Degree of data protection: none, integrity, or privacy. Quality of Protection informs the authorizations service that extra services are required when permitting access to the object.

Although ISAM provides these POP attributes, it enforces only the following attributes:

Each resource manager or plug-in can optionally enforce one or more of the following attributes:

For Security Verify Access IP address support:

Parent topic: Verify Access Platform and Supporting Components administration