
ACL Reference
Chapter 9
Authorization
339
a.
Select Allow or Deny from the Access field to allow or deny the operation
specified in this ACI to the group(s), user(s) or IP address(es) specified. For more
information about allowing or denying access, see “Allow and Deny,” on page
335.
b.
Select one operator from the possible operators in the Operators list. You can
select more than one operator for this ACI by holding down Ctrl and selecting all
operators that will be included in the ACI.
c.
Specify the user, group, or IP address that will be granted or denied access to the
selected operators by providing the correct syntax in the Syntax field. See
“Syntax,” on page 336 for details on syntax.
d.
Click OK.
7.
Click Refresh when you are done.
ACL Reference
This section lists all ACL resources defined for all subsystems, describes what each
resource controls, lists the possible operations describing the outcome of those operations,
and provides the default ACIs for each ACL resource defined. Each subsystem you install
will contain only those ACLs that are relevant to that subsystem.
certServer.acl.configuration
Allow or deny a read or modify operation to the ACL configuration.
Operations
Default ACIs
allow (read) group=”Administrators” || group=”Certificate Manager
Agents” || group=”Registration Manager Agents” || group=”Data
Recovery Manager Agents” || group=”Online Certificate Status Manager
Agents” || group=Auditors
allow (modify) group=”Administrators”
read
Viewing ACL resources and listing ACL resources, ACL listing
evaluators, and ACL evaluator types.
modify
Adding, deleting, and updating ACL evaluators.
Содержание CERTIFICATE 7.1 ADMINISTRATOR
Страница 1: ...Administrator s Guide Red Hat Certificate System Version7 1 September 2005 ...
Страница 22: ...22 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 128: ...Cloning a CA 128 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 230: ...Configuring Key Archival and Recovery Process 230 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 234: ...Enterprise Security Client 234 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 368: ...ACL Reference 368 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 460: ...Constraints Reference 460 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 592: ...CRL Extension Reference 592 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 676: ...Cloning the Data Recovery Manager 676 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 688: ...Security Requirements for the IT Environment 688 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 720: ...1 3 Organization Security Policies 720 Red Hat Certificate System Administrator s Guide September 2005 ...