acl modify

Modifies access control list (ACL) policies.

Requires authentication (administrator ID and password) to use this command.

Syntax

acl modify acl_name delete attribute attribute_name [attribute_value]

acl modify acl_name description description

acl modify acl_name remove any-other

acl modify acl_name remove group group_name

acl modify acl_name remove unauthenticated

acl modify acl_name remove user user_name

acl modify acl_name set any-other [permissions]

acl modify acl_name set attribute attribute_name attribute_value

acl modify acl_name set description description

acl modify acl_name set group group_name [permissions]

acl modify acl_name set unauthenticated [permissions]

acl modify acl_name set user user_name [permissions]

Options

acl_name
Specifies the ACL policy that you want to be modified. The ACL policy must exist, or an error is displayed.

Examples: default-root, test, default-management, and pubs_acl3

delete attribute attribute_name [attribute_value]
Deletes the specified extended attribute name and value from the specified ACL. The attribute must exist, or an error is displayed.

The attribute_value deletes the specified value from the specified extended attribute key in the specified ACL. (Optional)

Examples of extended attribute names and values:
Dept_No 445
Employee_Name "Diana Lucas"
description description
Sets or modifies the description for the specified ACL. This option is equivalent to the acl modify set description command. Use the acl modify description command instead of the acl modify set description command.

A valid description is an alphanumeric string that is not case-sensitive. String values are expected to be characters that are part of the local code set. Spaces are allowed.

If the description contains a space, ensure that you enclose the description in double quotation marks. You can specify an empty string ("") to clear an existing description.

Example of description: "Department number of employee"

permissions
Security Access Manager uses a set of default actions (known as primary action tasks and permissions) that cover a wide range of operations. You can also create your own action tasks and permissions.
A complete list of primary action tasks and their associated permissions includes:
T Traverse Base
c Control Base
g Delegation Base
m Modify Generic
d Delete Generic
b Browse Base
s Server Admin Generic
v View Generic
a Attach Base
B Bypass POP Base
t Trace Base
r Read WebSEAL
x Execute WebSEAL
l List Directory WebSEAL
N Create Base
W Password Base
A Add Base
R Bypass AuthzRule Base

For more information on actions, see Action groups and actions. For a description of default permissions, see Default permissions in the primary action group.

remove any-other
Removes the ACL entry for the any-other user category from the specified ACL.
remove group group_name
Removes the ACL entry for the specified group from the specified ACL. The group must exist, or an error is displayed.

Examples of group names are Credit, Sales, and Test-group.

remove unauthenticated
Removes the ACL entry for the unauthenticated user category from the specified ACL.
remove user user_name
Removes the ACL entry for the specified user from the specified ACL. The user must exist, or an error is displayed.

Examples of user names are dlucas, sec_master, and "Mary Jones".

set any-other [permissions]
Sets or modifies the ACL entry for the any-other user category in the ACL. Valid actions, or permissions, are represented by single alphabetic ASCII characters (a-z, A-Z).
set attribute attribute_name attribute_value
Sets the extended attribute value for the specified extended attribute key in the specified ACL. The attribute must exist, or an error is displayed. If the attribute exists, the attribute value is added as an additional value if the same value does not exist for this attribute. If the same value exists for this attribute, it does not get added again (duplicate values are not allowed), and no error is returned.

The optional attribute_value sets the specified value from the specified extended attribute key in the specified ACL.

Examples of extended attribute names and values:
Dept_No 445
Employee_name "Diana Lucas"
set description description
Sets or modifies the description for the specified ACL. This option is equivalent to the acl modify description command. Use the acl modify description command instead of the acl modify set description command.
set group group_name [permissions]
Sets or modifies the ACL entry for the specified group in the specified ACL. The group must exist, or an error is displayed.

Examples of group names are Credit, Sales, and Test-group.

Security Access Manager uses a set of default actions that cover a wide range of operations. Valid actions, or permissions, are represented by single alphabetic ASCII characters (a-z, A-Z). See set any-other [permissions] for the list of possible permissions.

set unauthenticated [permissions]
Sets or modifies the ACL entry for the unauthenticated user category in the specified ACL.

Security Access Manager uses a set of default actions that cover a wide range of operations. Valid actions, or permissions, are represented by single alphabetic ASCII characters (a-z, A-Z). See set any-other [permissions] for examples of permissions.

set user user_name [permissions]
Sets permissions that the user is permitted to perform. The user must exist or an error is displayed.

Examples of user names are dlucas, sec_master, and "Mary Jones".

Security Access Manager uses a set of default actions that cover a wide range of operations. Valid actions, or permissions, are represented by single alphabetic ASCII characters (a-z, A-Z). See set any-other [permissions] for examples of permissions.

Return codes

0
The command completed successfully.
1
The command failed. When a command fails, the pdadmin command provides a description of the error and an error status code in hexadecimal format (for example, 0x14c012f2). See "Error messages" in the IBM Knowledge Center. This reference provides a list of the Security Access Manager error messages by decimal or hexadecimal codes.

Examples

  • The following example sets the any-other user entry in the pubs ACL to have r, the Read (WebSEAL) permission:
    pdadmin sec_master> acl modify pubs set any-other r
  • The following example sets the sales group entry in the pubs ACL to have the Tr permissions, which are the Traverse and Read (Base) permissions:
    pdadmin sec_master> acl modify pubs set group sales Tr
  • The following example sets the unauthenticated user entry in the docs ACL to have the r permission, which is the Read (WebSEAL) permission:
    pdadmin sec_master> acl modify docs set unauthenticated r
  • The following example sets the peter user entry in the pubs ACL to have the Tr permissions, which are the Traverse (Base) and Read (WebSEAL) permissions:
    pdadmin sec_master> acl modify pubs set user peter Tr
  • The following example sets the kathy user entry in the test ACL to have Tbr permissions, which are the Traverse (Base), Browse (Base) and Read (WebSEAL) permissions. It also sets custom permissions PS for the existing test-group action group. It then displays the results.
    pdadmin sec_master> acl modify test set user kathy Tbr[test-group]PS
    
    pdadmin sec_master> acl show test
    
    ACL Name: test
    Description:
    Entries:
    User sec_master TcmdbsvaBl
    Group ivmgrd-servers Tl
    Any-other r
    User kathy Tbr[test-group]PS
  • The following example sets the kathy user entry in the test ACL to have Tbr permissions, which are the Traverse (Base), Browse (Base), and Read (WebSEAL) permissions. It then displays the results.
    pdadmin sec_master> acl modify test set user kathy Tbr
    
    pdadmin sec_master> acl show test
    
    ACL Name: test
    Description:
    Entries:
    User sec_master TcmdbsvaBl
    Group ivmgrd-servers Tl
    Any-other r
    User kathy Tbr