Object space management
Security Verify Access represents resources to be protected with a virtual representation of the object space that is called the protected object space.
An object space consists of resource objects and container objects. Resource objects are logical representations of resources to be protected. Use Container objects to group resource objects and other container objects hierarchically into logical groups or regions. Grouping similar objects makes it easier for you to administer a consistent security policy.
Security policy is applied by attaching access control list (ACL) policies, protected object policies (POPs), and authorization rules to the objects in the object space. These objects represent the physical resources you want to protect. The Security Verify Access authorization service evaluates user credentials and the conditions specified in the security policy. Then, Security Verify Access determines whether to permit or deny access to resources.
- The
/Managementobject space during the installation of any Security Verify Access product, if it does not exist - The
/WebSEALobject space during the installation of Security Verify Access