acl modify
Modifies access control list (ACL) policies.
Requires authentication (administrator ID and password) to use this command.
Syntax
acl modify acl_name delete
attribute attribute_name [attribute_value]
acl
modify acl_name description description
acl
modify acl_name remove
any-other
acl modify acl_name remove
group group_name
acl
modify acl_name remove
unauthenticated
acl modify acl_name remove
user user_name
acl
modify acl_name set
any-other [permissions]
acl
modify acl_name set
attribute attribute_name attribute_value
acl
modify acl_name set
description description
acl
modify acl_name set
group group_name [permissions]
acl
modify acl_name set
unauthenticated [permissions]
acl
modify acl_name set
user user_name [permissions]
Options
acl_name- Specifies the ACL policy that you want to be modified. The ACL
policy must exist, or an error is displayed.
Examples:
default-root,test,default-management, andpubs_acl3 delete attributeattribute_name[attribute_value]- Deletes the specified extended attribute name and value from the
specified ACL. The attribute must exist, or an error is displayed.
The
attribute_valuedeletes the specified value from the specified extended attribute key in the specified ACL. (Optional)Examples of extended attribute names and values:Dept_No 445 Employee_Name "Diana Lucas" descriptiondescription- Sets or modifies the description for the specified ACL. This option
is equivalent to the acl modify set description command.
Use the acl modify description command instead
of the acl modify set description command.
A valid description is an alphanumeric string that is not case-sensitive. String values are expected to be characters that are part of the local code set. Spaces are allowed.
If the description contains a space, ensure that you enclose the description in double quotation marks. You can specify an empty string ("") to clear an existing description.
Example of description:
"Department number of employee" permissions- Security Access Manager uses
a set of default actions (known as primary action tasks
and permissions) that cover a wide range of operations. You can also
create your own action tasks and permissions. A complete list of primary action tasks and their associated permissions includes:
T Traverse Base c Control Base g Delegation Base m Modify Generic d Delete Generic b Browse Base s Server Admin Generic v View Generic a Attach Base B Bypass POP Base t Trace Base r Read WebSEAL x Execute WebSEAL l List Directory WebSEAL N Create Base W Password Base A Add Base R Bypass AuthzRule BaseFor more information on actions, see Action groups and actions. For a description of default permissions, see Default permissions in the primary action group.
remove any-other- Removes the ACL entry for the any-other user category from the specified ACL.
remove groupgroup_name- Removes the ACL entry for the specified group from the specified
ACL. The group must exist, or an error is displayed.
Examples of group names are
Credit,Sales, andTest-group. remove unauthenticated- Removes the ACL entry for the unauthenticated user category from the specified ACL.
remove useruser_name- Removes the ACL entry for the specified user from the specified
ACL. The user must exist, or an error is displayed.
Examples of user names are
dlucas,sec_master, and"Mary Jones". set any-other[permissions]- Sets or modifies the ACL entry for the any-other user category in the ACL. Valid actions, or permissions, are represented by single alphabetic ASCII characters (a-z, A-Z).
set attributeattribute_nameattribute_value- Sets the extended attribute value for the specified extended attribute
key in the specified ACL. The attribute must exist, or an error is
displayed. If the attribute exists, the attribute value is added as
an additional value if the same value does not exist for this attribute.
If the same value exists for this attribute, it does not get added
again (duplicate values are not allowed), and no error is returned.
The optional
attribute_valuesets the specified value from the specified extended attribute key in the specified ACL.Examples of extended attribute names and values:Dept_No 445 Employee_name "Diana Lucas" set descriptiondescription- Sets or modifies the description for the specified ACL. This option is equivalent to the acl modify description command. Use the acl modify description command instead of the acl modify set description command.
set groupgroup_name[permissions]- Sets or modifies the ACL entry for the specified group in the
specified ACL. The group must exist, or an error is displayed.
Examples of group names are
Credit,Sales, andTest-group.Security Access Manager uses a set of default actions that cover a wide range of operations. Valid actions, or permissions, are represented by single alphabetic ASCII characters (a-z, A-Z). See
set any-other[permissions] for the list of possible permissions. set unauthenticated[permissions]- Sets or modifies the ACL entry for the unauthenticated user
category in the specified ACL.
Security Access Manager uses a set of default actions that cover a wide range of operations. Valid actions, or permissions, are represented by single alphabetic ASCII characters (a-z, A-Z). See
set any-other[permissions] for examples of permissions. set useruser_name[permissions]- Sets permissions that the user is permitted to perform. The user
must exist or an error is displayed.
Examples of user names are
dlucas,sec_master, and"Mary Jones".Security Access Manager uses a set of default actions that cover a wide range of operations. Valid actions, or permissions, are represented by single alphabetic ASCII characters (a-z, A-Z). See
set any-other[permissions] for examples of permissions.
Return codes
- 0
- The command completed successfully.
- 1
- The command failed. When a command fails, the pdadmin command
provides a description of the error and an error status code in hexadecimal
format (for example,
0x14c012f2). See "Error messages" in the IBM Knowledge Center. This reference provides a list of the Security Access Manager error messages by decimal or hexadecimal codes.
Examples
- The following example sets the
any-otheruser entry in thepubsACL to haver, the Read (WebSEAL) permission:pdadmin sec_master> acl modify pubs set any-other r - The following example sets the
salesgroup entry in thepubsACL to have theTrpermissions, which are the Traverse and Read (Base) permissions:pdadmin sec_master> acl modify pubs set group sales Tr - The following example sets the
unauthenticateduser entry in thedocsACL to have therpermission, which is the Read (WebSEAL) permission:pdadmin sec_master> acl modify docs set unauthenticated r - The following example sets the
peteruser entry in thepubsACL to have theTrpermissions, which are the Traverse (Base) and Read (WebSEAL) permissions:pdadmin sec_master> acl modify pubs set user peter Tr - The following example sets the
kathyuser entry in thetestACL to haveTbrpermissions, which are the Traverse (Base), Browse (Base) and Read (WebSEAL) permissions. It also sets custom permissionsPSfor the existingtest-groupaction group. It then displays the results.pdadmin sec_master> acl modify test set user kathy Tbr[test-group]PS pdadmin sec_master> acl show test ACL Name: test Description: Entries: User sec_master TcmdbsvaBl Group ivmgrd-servers Tl Any-other r User kathy Tbr[test-group]PS - The following example sets the
kathyuser entry in thetestACL to haveTbrpermissions, which are the Traverse (Base), Browse (Base), and Read (WebSEAL) permissions. It then displays the results.pdadmin sec_master> acl modify test set user kathy Tbr pdadmin sec_master> acl show test ACL Name: test Description: Entries: User sec_master TcmdbsvaBl Group ivmgrd-servers Tl Any-other r User kathy Tbr