Previous Topic: Search for UsersNext Topic: Configure Global User and Global Group Storage


Create Access Policies

Access policies are rules that are created in CA EEM and attached to CA Configuration Automation users and user groups to define access rights for CA Configuration Automation features. CA EEM matches identities and resource classes to determine whether policies apply to users.

The Access Management tab page contains a link to the Policies page. On the Policies page, you can search, view, create, and edit access policies.

The application sorts policies in the tree by the policy type and displays them under the following tabs:

Explicit Grants

Permits the identities with the specified access rights to the specified resources when the policy evaluates to "true."

Explicit Denies

Prevents the identities with the specified access rights to the specified resources when the policy evaluates to "true."

The application includes the following policy types in addition to application-specific access policies:

Delegation Policies

Enables the users to delegate their authority to other users.

Dynamic User Group Policies

Specifies the policies that use rules to define application-specific groups and their membership.

Event Policies

Determines which events are delivered, and which events are only coalesced into summaries. By using event policies, you can configure which events the application reports about in detail.

Obligation Policies

Returns required actions to the application after verifying authorization. The obligation policies are application-specific. They contain one or more obligation names and attributes. Your application can use obligation policies to control what actions to perform when access is granted or denied. For example, the application can send an event, start a workflow process, or send an email.

Scoping Policies

Limits the administrator access to the CA EEM objects, such as policies or a calendar.

Follow these steps:

  1. Open CA Configuration Automation, click the Administration link, then click the Access Management tab.

    The CA EEM Home tab opens in the context of CA Configuration Automation.

    Note:

  2. Click Manage Identities, then click the Policies link.
  3. On the Policies page, click the Explicit Grants or the Explicit Denies tab, then click the New Access Policy icon for any Access Policies folder.

    accessProfiles

  4. In the New Access Profile page, complete the following fields, then click Save.
    Name

    Defines the policy name. To prevent display issues, Use only alphanumeric characters.

    Description

    Describes the policy. For example, you can specify the purpose of the policy.

    Calendar

    Specifies the calendar to use during the policy evaluation match phase. If you do not specify a calendar, all days and times match.

    Resource Class Name

    Specifies the name of the resource class for which the policy is defined. For example, you can set the resource class name for all delegation policies to safeDelegation and the resource class for all obligation policies to safeObligation. Define new resource classes on the Application Instances page.

    Explicit Deny

    Specifies whether the policy explicitly denies the access that the policy specifies and that the Explicit Denies tab displays.

    Disabled

    Specifies whether the policy is disabled and is not considered for the match phase.

    Pre-Deployment

    Specifies whether the policy is considered inactive. If you select the Pre-Deployment check box, the application does not use the policy to verify permissions.

    Type

    The following fields control the Access Policy Configuration:

    Access Policy

    Applies the actions and filters to all listed resources.

    Access Control List

    Specifies that each listed resource has specific actions and zero or one filter.

    Identity Access Control List

    Specifies that the application applies the actions to specific identities. The application creates a default rule that applies to all identities that are not in the list. The application also marks identity types (user, application groups, global groups, and dynamic groups) with icons.

    Note: The application maintains a simple list for the resources, and has no filters for this type of policy.

    Identities Panel

    Defines a list of identities (users, user groups, and global user groups) to use during the policy evaluation match phase. If this list is empty, all identities match.

    Type

    Specifies the type of identity (User, Application Group, Global Group, or Dynamic Group).

    After you select a type, you can specify search criteria such as the attribute, operator, and value and click Search to display matching identities.

    Identity

    Displays the identities that match the specified Type.

    Selected Identities

    Displays the identities to which the policy applies. To move an identity to the Selected Identity field, click the right arrow.

    Access Policy Configuration Panel

    The Access Policy Configuration panel displays the following fields when the selected Type is Access Policy:

    Add Resources

    Defines which resources to use during the policy evaluation match phase. To designate wildcard characters, use the asterisk (*) at the beginning or the end of the resource name. The product processes asterisks in the middle of the resource class name as literals.

    Actions

    Specifies the actions (one or more of create, update, delete, export, or import) to use during the match phase of policy evaluation. If you do not select an action, all actions match.

    Filters

    Defines the filters to use in the policy evaluation evaluate phase. To define a filter, click Add Filter.

    Access Control List Configuration Panel

    The Access Policy Configuration panel displays the following fields when the selected Type is Access Control List:

    Add resource

    Defines a resource to use during the policy evaluation evaluate phase. Enter the resource name, then click the Add icon (+).

    Actions

    Specifies the actions (one or more of create, update, delete, export, or import) to use with the associated resource.

    Treat Resource Names as Regular Expressions

    Specifies whether to consider resource names as regular expressions. For example, an identity with access to the resource J*, saved as a regular expression, can access any resource that starts with J.

    Filters

    Defines the filter to which the associated resource name applies. To define a filter, click the pencil icon.

    Identity Access Control List Configuration Panel

    The Access Policy Configuration panel displays the following fields when the selected Type is Identity Access Control List:

    Type

    Specifies the type of identity (User, Application Group, Global Group, or Dynamic Group).

    After you select a type, you can specify search criteria such as the attribute, operator, and value and click Search to display matching identities.

    Identity

    Displays the identities that match the specified Type.

    Selected Identities

    Displays the identities to which the policy applies.

    Resources

    Defines a resource to use during the policy evaluation evaluate phase. This resource has specific associated actions and a filter.

    Add Resources

    Defines which resources to use during the policy evaluation match phase. To designate wildcard characters, use the asterisk (*) at the beginning or the end of the resource name. The product processes asterisks in the middle of the resource class name as literals.

    Treat Resource Names as Regular Expressions

    Specifies whether to consider resource names as regular expressions. For example, an identity with access to the resource J*, saved as a regular expression, can access any resource that starts with J.

    The application creates the Access Profile.