This class is for authorization permissions. An JAZNPermission contains a name (also referred to as a "target name") but no actions list; you either have the named permission or you don't. <p/> The target name is the name of the JAZN permission (see below). <p/> The following table lists all the possible target names for an JAZNPermission, and for each provides a description of what the permission allows and a discussion of the risks of granting the permission. <p/> Note:Risks section TBD <p/>
Permission Name |
the Permission Allows |
Risks of Allowing this Permission |
getPolicy |
allow the caller to retrieve the JAZNPolicy object |
This allows someone to retrieve a JAZNPolicy object. Since the JAZNPolicy object can be used to modify the policy store, this permission should be granted only to the administrators. |
getRealmManager |
allow the caller to retrieve the RealmManager object |
This allows someone to retrive a RealmManager object. Since the RealmManager object can be used to create/drop/modify realms, this permission should be granted only to the administrators. |
getProperty.{propertyName} |
allow the caller to retrieve the value of the JAZN property named {propertyName} |
Depending on the particular key for which access has been granted, the code may have access to the location of the backend server as well as security credentials used to access the backend server. This should be very carefully protected and only be granted to administrators. |
setProperty.{propertyName} |
allow the caller to set the value of the JAZN property named {propertyName} |
This could include setting a new backend server as well as new credentials to access the backend server. Since this can be used to bypass the enterprise policy, this should be very carefully protected and only be granted to administrators. |