|
|
|
|
|
| | | |
Access Control List MIB
An access control list (ACL) specifies who and what is authorized to access Tuxedo or WebLogic Enterprise system objects. The Access Control List MIB enables a system manager to administer Tuxedo or WebLogic Enterprise security by authenticating users, setting permissions, and controlling access. It defines the objects controlled by the ACL facility. These MIB objects are grouped into three major categories.
The Access Control List MIB consists of the following groups.
For Tuxedo or WebLogic Enterprise security, define application security options in the Domain group. This group lets you specify a user identity and security type used by your Tuxedo/WLE application. The users and remote domains in an application that need authentication and authorization are collectively known as principals. The managed objects for getting or setting the values of principals are defined in the tuxTAclPrinTbl group. The managed objects for getting or setting the values of ACL groups are defined in the tuxTAclGrpTable. The Access Control List MIB, as a whole, specifies the principals and access control lists for Tuxedo/WLE applications services, application queues, and events. You can define these ACL permissions for service, event, and application queue names. The managed objects that enable you to do define the ACL permissions are defined in the tuxTAclPermTable group. All these ACL MIB groups and their objects are described in the following sections.
tuxTAclGrpTable
The tuxTAclGrpTable group contains objects that represent groups of Tuxedo/WLE application users and domains. The following table lists the managed objects that are part of the tuxTAclGrpTable group. To create a new row in the table, it is necessary to issue a SET request for a non-existing row.
|
Object Name |
Object ID |
|---|---|
|
tuxTAclGrpName |
.1.3.6.1.4.1.140.300.11.1.1.1.1 |
|
tuxTAclGrpId |
.1.3.6.1.4.1.140.300.11.1.1.1.2 |
|
tuxTAclGrpState |
.1.3.6.1.4.1.140.300.11.1.1.1.3 |
tuxTAclGrpName
Syntax
DisplayString (SIZE(1..30))
Access
read-write
Description
Logical name of the group. A group name is a string of printable characters and cannot contain a pound sign, comma, colon, or newline.
Note: This object can be set only during row creation.
tuxTAclGrpId
Syntax
INTEGER (0..16384)
Access
read-write
Description
Group identifier associated with this user. A value of 0 indicates the default group other. If the group identifier is not specified at creation time, it defaults to the next available (unique) identifier greater than 0.
tuxTAclGrpState
Syntax
INTEGER { valid(1), invalid(2) }
Access
read-write
Description
The values for GET and SET operations are as follows:
tuxTAclPermTable
The tuxTAclPermTable group indicates what groups are allowed to access Tuxedo/WLE system entities. These entities are named by a string. The names currently represent service names, event names, and application queue names. To create a new row in this table, it is necessary to issue a SET request for a non-existing row that specifies at least the values for tuxTAclPermName and tuxTAclPermType.
tuxTAclPermName
Syntax
DisplayString (SIZE(1..30))
Access
read-write
Description
The name of the entity for which permissions are being granted. The name can represent a service name, an event name, and/or a queue name. An ACL name is a string of printable characters and cannot contain a colon, pound sign, or newline.
Note: This object can be set only during row creation.
tuxTAclPermType
Syntax
INTEGER { enq(1), deq(2), service(3), postevent(4) }
Access
read-write
Description
The type of the entity for which permissions are being granted.
Note: This object can be set only during row creation.
tuxTAclPermGrpIds
Syntax
DisplayString (SIZE(0..800))
Access
read-write
Description
A comma-separated list of group identifiers (numbers) that are permitted access to the associated entity.
tuxTAclPermState
Syntax
INTEGER { valid(1), invalid(2) }
Access
read-write
Description
The values for GET and SET operations are as follows:
Note: The tuxTAclPermTable instance refers to all groupids related to a particular tuxTAclPermName in the table.
tuxTAclPrinTbl
The tuxTAclPrinTbl group contains objects that represent users or domains that can access a Tuxedo/WLE application and the group with which they are associated. To join the application as a specific user, it is necessary to present a user-specific password. To create a new row in this table, it is necessary to issue a SET request for a non-existing row (instance).
tuxTAclPrinName
Syntax
DisplayString (SIZE(1..30))
Access
read-write
Description
Logical name of the user or domain (a principal). A principal name is a string of printable characters and cannot contain a pound sign, colon, or newline.
Note: This object can be set only during row creation.
tuxTAclCltName
Syntax
DisplayString (SIZE(1..30))
Access
read-write
Description
The client name associated with the user. It generally describes the role of the associated user and provides a further qualifier on the user entry. If the client name is not specified at creation time, the default is the wildcard asterisk (*). A client name is a string of printable characters and cannot contain a colon or newline.
tuxTAclPrinId
Syntax
INTEGER (1..131072)
Access
read-write
Description
Unique user identification number. If not specified at creation time, it defaults to the next available (unique) identifier greater than 0.
Note: This object can be set only during row creation.
tuxTAclPrinGrp
Syntax
INTEGER (0..16384)
Access
read-write
Description
Group identifier associated with this user. A value of 0 indicates the default group other. If the group identifier is not specified at creation time, the default value 0 is assigned.
tuxTAclPrinPasswd
Syntax
DisplayString
Access
read-write
Description
The clear-text authentication password for the associated user. Note that the system automatically encrypts this information on behalf of the administrator.
tuxTAclPrinState
Syntax
INTEGER { valid(1), invalid(2) }
Access
read-write
Description
The values for GET and SET operations are as follows:
|
|
|
|
|
|
Copyright © 2001 BEA Systems, Inc. All rights reserved.
|