Each record in the TCP class defines a TCP/IP service such as mail, ftp, and http. When the TCP class is being used for authorization, hosts can obtain services from the local host only if the TCP resources grant access. Also, users or groups on a local host can use the TCP/IP services to access remote hosts only if the TCP resources grant access.
The ACL in a TCP record can specify access types for hosts (HOST), groups of hosts (GHOST), networks (HOSTNET), and sets of hosts (HOSTNP).
The CACL in a TCP record can specify access types for hosts (HOST), groups of hosts (GHOST), networks (HOSTNET), and sets of hosts (HOSTNP), and can also specify access types for users and groups.
You can set rules based on IPv4 addresses, not just on host names. This means that you can cater for a domain name change.
Note: CA ControlMinder access rules for IP communication apply only to IPv4. CA ControlMinder does not control access by IPv6.
Note: If the CONNECT class is being used as a criterion for access, the TCP class cannot effectively control access. Use either the TCP class or the CONECT class to protect a connection, not both.
The key of the TCP record is the name of the TCP/IP service. The TCP class controls both outgoing services and incoming services.
The following definitions describe the properties contained in a TCP class record. Most properties are modifiable and can be manipulated using selang or the administration interfaces. Non-modifiable properties are marked informational.
Defines the hosts for which the local host provides service and the access types that are allowed.
Each element in the access control list contains the following information:
Defines a HOST, GHOST, HOSTNET, or HOSTNP record.
The access authority that the referenced host has to the resource. The valid access authorities are:
Use the access parameter of the authorize or authorize- command to modify this property
A list of accessors (users and groups) permitted to access the resource and the host or hosts they can access. Each element in the conditional access control list (CACL) contains the following information:
Defines an accessor.
Defines a HOST, GHOST, HOSTNET, or HOSTNP record
Defines the access authority that the accessor has to the resource. The valid access types are:
Use the authorize or authorize- command to modify this property.
Defines a list of the accessors (users and groups) that are permitted to access the resource, and their access types according to the Unicenter NSM calendar status.
Each element in the calendar access control list (CALACL) contains the following information:
Defines an accessor.
Defines a reference to a calendar in Unicenter TNG.
Defines the access authority that the accessor has to the resource.
Access is permitted only when the calendar is ON. Access is denied in all other cases.
Use the calendar parameter with the authorize command to permit user or group access to the resource according to the access defined in the calendar ACL.
Represents a Unicenter TNG calendar object for user, group, and resource restrictions in CA ControlMinder. CA ControlMinder fetches Unicenter TNG active calendars at specified time intervals.
Defines additional information that you want to include in the record. CA ControlMinder does not use this information for authorization.
Limit: 255 characters.
(Informational) Displays the date and time when the record was created.
Defines the day and time restrictions that govern when an accessor can access a resource.
Use the restrictions parameter with the chres, ch[x]usr, or ch[x]grp commands to modify this property.
The resolution of daytime restrictions is one minute.
Defines the list of CONTAINER records that a resource record belongs to.
To modify this property in a class record, change the MEMBERS property in the appropriate CONTAINER record.
Use the mem+ or mem‑ parameter with the chres, editres or newres command to modify this property.
The NACL property of a resource is an access control list that defines the accessors that are denied authorization to a resource, together with the type of access that they are denied (for example, write). See also ACL, CALACL, PACL. Each entry in the NACL contains the following information:
Defines an accessor.
Defines the type of access that is denied to the accessor.
Use the authorize deniedaccess command, or the authorize- deniedaccess- command, to modify this property.
Defines the user to be notified when a resource or user generates an audit event. CA ControlMinder can email the audit record to the specified user.
Limit: 30 characters.
Defines the user or group that owns the record.
Defines the types of access events that CA ControlMinder records in the audit log. RAUDIT derives its name from Resource AUDIT. Valid values are:
All access requests.
Granted access requests.
Denied access requests (default).
No access requests.
CA ControlMinder records events on each attempted access to a resource, and does not record whether the access rules were applied directly to the resource, or were applied to a group or class that had the resource as a member.
Use the audit parameter of the chres and chfile commands to modify the audit mode.
Defines the default access authority for the resource, which indicates the access granted to accessors who are not defined to CA ControlMinder or who do not appear in the ACL of the resource.
Use the defaccess parameter with the chres, editres, or newres command to modify this property.
(Informational) Displays the date and time when the record was last modified.
(Informational) Displays the administrator who performed the update.
Specifies whether Warning mode is enabled. When Warning mode is enabled on a resource, all access requests to the resource are granted, and if an access request violates an access rule, a record is written to the audit log.
Copyright © 2013 CA Technologies.
All rights reserved.
|
|