Each record in the APPL class defines an application used by eTrust SSO.
The key of the APPL class record is the name of the application.
The following definitions describe the properties contained in this class record. Most properties are modifiable and can be manipulated using selang or the administration interfaces. Non-modifiable properties are marked as informational.
Defines a list of accessors (users and groups) permitted to access the resource, and the accessors' access types.
Each element in the access control list (ACL) contains the following information:
Defines an accessor.
Defines the access authority that the accessor has to the resource.
Use the access parameter with the authorize or authorize- command to modify the ACL.
Used by eTrust SSO.
Defines the authorization ACL. The authorization ACL is an ACL that allows access to a resource based on the resource description. The description is sent to the authorization engine, not the object. Typically, when an AZNACL is used, the object is not in the database.
Defines a list of the accessors (users and groups) that are permitted to access the resource, and their access types according to the Unicenter NSM calendar status.
Each element in the calendar access control list (CALACL) contains the following information:
Defines an accessor.
Defines a reference to a calendar in Unicenter TNG.
Defines the access authority that the accessor has to the resource.
Access is permitted only when the calendar is ON. Access is denied in all other cases.
Use the calendar parameter with the authorize command to permit user or group access to the resource according to the access defined in the calendar ACL.
Represents a Unicenter TNG calendar object for user, group, and resource restrictions in CA ControlMinder. CA ControlMinder fetches Unicenter TNG active calendars at specified time intervals.
The text under the application's icon on the desktop. The default is the name of the APPL record.
Limit: 47 alphanumeric characters.
The file name of the application executable. Used by eTrust SSO.
Limit: 255 characters.
Defines additional information that you want to include in the record. CA ControlMinder does not use this information for authorization.
Limit: 255 characters.
The record names of the contained applications, if the record is a container.
Use the item[-](applName) parameter with the chres, editres, and newres commands to modify this property.
The record names of container applications, if the record is contained in other applications.
(Informational) Displays the date and time when the record was created.
Defines the day and time restrictions that govern when an accessor can access a resource.
Use the restrictions parameter with the chres, ch[x]usr, or ch[x]grp commands to modify this property.
The resolution of daytime restrictions is one minute.
The name of the eTrust SSO script in the directory containing the login sequence for the application. The default directory location is /usr/sso/scripts. The default value is “no script”.
Use the script[‑](fileName) parameter with the chres, editres, and newres commands to modify this property.
A list of user groups authorized to use the application.
The name of the host where the application resides.
Use the host[‑](hostName) parameter with the chres, editres, and newres commands to modify this property.
The file name or full path of the file containing the icon representing the application on the desktop. CA ControlMinder expects to find the icon on the end user's workstation. If just a file name is entered, the search order for the file is as follows:
The default is the default icon of the workstation.
The numeric ID (if necessary) of the icon within the icon file. If the ICONID is not specified, the default icon is used.
Whether the application is a container. The default is “no”.
Use the container[-] parameter with the chres, editres, and newres commands to modify this property.
Whether the application is disabled. If the application is disabled, users cannot log into it. This feature is useful when you change an application and you do not want any users to log in to the application while you make it. The disabled application appears in the application menu list, but if a user selects the application the login is terminated with an appropriate message. The default is “not disabled”.
Whether the application icon appears on the desktop even for users who can invoke it. You may want to hide a master application, for example an application that only serves the purpose of supplying passwords to other applications. The default is “not hidden”.
Use the hidden[-] parameter with the chres, editres, and newres commands to modify this property.
Whether re‑authentication is required when the user opens the application after a preset time. The default is “not sensitive”.
Use the sensitive[‑] parameter with the chres, editres, and newres commands to modify this property.
The way user passwords are provided. The value is pwd (plain password), otp (One Time Password), appticket (a proprietary ticket for mainframe application authentication)., none (no password required), or passticket (a one‑time password replacement format created by IBM and used by mainframe security packages). The default is pwd.
Use the login_type(value) parameter with the chres, editres, and newres commands to modify this property.
The record name of the application that supplies the password to other applications. The default is no master.
Use the master[‑](applName) parameter with the chres, editres, and newres commands to modify this property.
The NACL property of a resource is an access control list that defines the accessors that are denied authorization to a resource, together with the type of access that they are denied (for example, write). See also ACL, CALACL, PACL. Each entry in the NACL contains the following information:
Defines an accessor.
Defines the type of access that is denied to the accessor.
Use the authorize deniedaccess command, or the authorize- deniedaccess- command, to modify this property.
Defines the user to be notified when a resource or user generates an audit event. CA ControlMinder can email the audit record to the specified user.
Limit: 30 characters.
Defines the user or group that owns the record.
A directory, or a list of directories, where the application's executable file resides. Used by eTrust SSO.
Indicates whether the application password is automatically generated by eTrust SSO. The default is no.
Indicates whether the application password is automatically kept identical to those of the other applications. The default is no.
The record name of the password policy for the application. A password policy is a set of rules for checking the validity of a new password and for defining when a password expires. The default is no validity check.
Defines the types of access events that CA ControlMinder records in the audit log. RAUDIT derives its name from Resource AUDIT. Valid values are:
All access requests.
Granted access requests.
Denied access requests (default).
No access requests.
CA ControlMinder records events on each attempted access to a resource, and does not record whether the access rules were applied directly to the resource, or were applied to a group or class that had the resource as a member.
Use the audit parameter of the chres and chfile commands to modify the audit mode.
Indicates whether to execute one or more commands after the login script.
Indicates whether to execute one or more commands before the login script.
Used by eTrust SSO, a variables list with the variable values of the application script that are saved per application.
Used by eTrust SSO only.
Used by eTrust SSO only.
Defines the default access authority for the resource, which indicates the access granted to accessors who are not defined to CA ControlMinder or who do not appear in the ACL of the resource.
Use the defaccess parameter with the chres, editres, or newres command to modify this property.
(Informational) Displays the date and time when the record was last modified.
(Informational) Displays the administrator who performed the update.
Specifies whether Warning mode is enabled. When Warning mode is enabled on a resource, all access requests to the resource are granted, and if an access request violates an access rule, a record is written to the audit log.
Copyright © 2013 CA Technologies.
All rights reserved.
|
|