Define a TACL
Use the Access Control tab page to define a Timed Access Control List (TACL). Examples are provided at the end of the following procedure.
To define a TACL
Time-based access control is enabled.
Default: allow
Valid options include the following: Authenticated Connection, Server Registration, Router Registration, Master Router Registration, Server Client Registration, Manager Client Registration, Agent Connect, Agent Connect to Router, and Name Lookup.
Note: For more information about ENC events, see the "Extended Network Connectivity (ENC) Gateway" chapter in the Implementation Guide.
Select the type of security principal in the Timed Access Control Entry (TACE). Valid values are as follows: Exact Match, Pattern Match, and Realm.
Default: Pattern Match
If Realm is selected in the Match Type field, select the realm associated with the specified security principal.
If Pattern Match or Exact Match is specified in the Match Type field, specify the source URI. This field is not case sensitive.
Select the type of object being secured. Valid values are as follows: Exact Match, Pattern Match, and Realm.
Default: Pattern Match
If Realm is selected in the Match Type field, select the realm associated with the specified secured object.
If Pattern Match or Exact Match is specified in the Match Type field, specify the target URI. This field is not case sensitive.
The TACL is added to the Access Control table.
Examples
|
Access Type |
Events |
Security Principal URI or Realm |
Security Principal Match Type |
Secured Object URI or Realm |
Secured Object Match Type |
Description |
|
allow |
Authenticated Connection |
Comp09 |
Exact Match |
Comp08 |
Exact Match |
Allow comp09 to connect to comp08. |
|
deny |
Authenticated Connection |
Hua0[123] |
Pattern Match |
Comp09 |
Exact Match |
Deny Hua01, Hua02, and Hua03 connection to comp09. |
|
deny |
AgentConnect |
sunrealm |
Realm |
myrealm |
Realm |
Deny any node in sunrealm to access myrealm. |
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|