Working with protected object policies (or, in short, POPs) is pretty similar to working with ACLs. In this example we will create a POP that requires the end user to authenticate himself with protection level 1 on access to a junction.
First, we’ll create a new POP and display it’s content:
pdadmin sec_master> pop create level1 pdadmin sec_master> pop show level1 Protected object policy: level1 Description: Warning: No Audit level: none Quality of protection: none Time of day access: sun, mon, tue, wed, thu, fri, sat, :anytime:local IP Endpoint Authentication Method Policy Auth Level: 0 Network: Any Other Network pdadmin sec_master>
As you can see, by default this POP does not enforce any access restrictions. We are going to change that!
pdadmin sec_master> pop modify level1 set ipauth anyothernw 1 pdadmin sec_master> pop show level1 Protected object policy: level1 Description: Warning: No Audit level: none Quality of protection: none Time of day access: sun, mon, tue, wed, thu, fri, sat, :anytime:local IP Endpoint Authentication Method Policy Auth Level: 1 Network: Any Other Network pdadmin sec_master>
In order to attach a POP to some object, you need to know the object path. Let’s take a junction from our previous post as an example and attach our fresh POP to this junction:
pdadmin sec_master> pop attach /WebSEAL/isam-70.lab.mycompany.com-default/myjunction level1 pdadmin sec_master> pop find level1 /WebSEAL/isam-70.lab.mycompany.com-default/myjunction pdadmin sec_master>
Now you can see your POP attached to this junction!
There are much more POP-related options available. The full list is accessible via the build-in help system:
pdadmin sec_master> pop help Error: Unknown or incomplete command. Try one of: pop list <pop-name> attribute pop modify <pop-name> delete attribute <attr-name> pop modify <pop-name> delete attribute <attr-name> <attr-value> pop modify <pop-name> set attribute <attr-name> <attr-value> pop show <pop-name> attribute <attr-name> pop create <pop-name> pop delete <pop-name> pop modify <pop-name> set description <description> pop modify <pop-name> set tod-access <{anyday|weekday|<day-list>}>:<{anytime|<time-spec>-<time-spec>}>[:{utc|local}] pop modify <pop-name> set ipauth remove <network> <netmask> pop modify <pop-name> set ipauth anyothernw {<auth_level>|forbidden} pop modify <pop-name> set ipauth add <network> <netmask> {<auth_level>|forbidden} pop modify <pop-name> set warning {yes|no} pop modify <pop-name> set audit-level {all|none|<audit-level-list>} pop modify <pop-name> set qop {none|integrity|privacy} pop list pop show <pop-name> pop attach <object-name> <pop-name> pop detach <object-name> pop find <pop-name> pdadmin sec_master>