The following profiles can be used as either GLOBAL or LOCAL resource-level profiles. GLOBAL resource profiles are defined by omitting the BES subsystem number following the BES prefix.
Command Protection Profiles:
TSS ADDTO(department) OPERCMDS(BESn.command_name)
TSS PERMIT(besacid) OPERCMDS(BESn.command_name) ACCESS(READ)
TSS PERMIT(useracid) OPERCMDS(BESn.command_name) ACCESS(READ)
TSS PERMIT(useracid) OPERCMDS(BESn.command_name) ACCESS(NONE)
TSS ADDTO(department) CA@BES(BESn.CAEKMAPI)
TSS PERMIT(besacid) CA@BES(BESn.CAEKMAPI) ACCESS(READ)
TSS PERMIT(useracid) CA@BES(BESn.CAEKMAPI) ACCESS(NONE)
Key Protection-Digital Certificates:
TSS ADDTO(department) CA@BES(BESn.KEYCERT.certificate_name)
TSS PERMIT(besacid) CA@BES(BESn.KEYCERT.certificate_name) ACCESS(READ)
TSS PERMIT(useracid) CA@BES(BESn.KEYCERT.certificate_name) ACCESS(READ)
TSS PERMIT(useracid) CA@BES(BESn.KEYCERT.certificate_name) ACCESS(NONE)
Key Protection-Code Books:
TSS ADDTO(department) CA@BES(BESn.KEYCODE.codebook_name)
TSS PERMIT(besacid) CA@BES(BESn.KEYCODE.codebook_name) ACCESS(READ)
TSS PERMIT(useracid) CA@BES(BESn.KEYCERT.codebook_name) CCESS(READ)
TSS PERMIT(useracid) CA@BES(BESn.KEYCERT.codebook_name) ACCESS(NONE)
Key Protection-Symmetric Keys Books:
TSS ADDTO(department) CA@BES(BESn.KEYSYMM.symmetric_key_name)
TSS PERMIT(besacid) CA@BES(BESn.KEYSYMM.symmetric_key_name) ACCESS(READ)
TSS PERMIT(useracid) CA@BES(BESn.KEYSYMM.symmeetric_key_name) ACCESS(NONE)
Utility Protection Profiles:
TSS ADDTO(department) CA@BES(BESn.UTILITY.TBEKMUTL|TBESHOW)
TSS PERMIT(besacid) CA@BES(BESn.UTILITY.TBEKMUTL|TBESHOW) ACCESS(READ)
TSS PERMIT(useracid) CA@BES(BESn.UTILITY.TBEKMUTL|TBESHOW) ACCESS(NONE)
| Copyright © 2011 CA. All rights reserved. | Tell Technical Publications how we can improve this information |