Skip to Main Content
DCE Replacement Strategies
book

DCE Replacement Strategies

by Heinz Johner, Jakob Erber, Stephen Hawkins, Klaus Mueller, Pallavi Nagesha Rao, Donna Skibbie
June 2003
Intermediate to advanced content levelIntermediate to advanced
454 pages
10h 19m
English
IBM Redbooks
Content preview from DCE Replacement Strategies
148 DCE Replacement Strategies
pdadmin> object create /myapp/file1 “File 1 ” 2 ispolicyattachable yes
pdadmin> object create /myapp/file2 “File 1 ” 2 ispolicyattachable yes
Again, it is convenient to have scripts to do this, if possible.
3. Creating, modifying, and attaching ACLs to the objects added in the
objectspace.
Once the resources are migrated as protected objects in the IBM Tivoli
Access Manager, corresponding ACLs must be set on each protected object.
The following steps outline what needs to be done:
a. Create ACLs: Create new access control lists using the acl create
command. This creates new ACL policies in the ACL database, but not
specific ACL entries.
b. Modify ACLs: Set ACL entries using the acl modify command for the
users and ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Reinventing the Organization for GenAI and LLMs

Reinventing the Organization for GenAI and LLMs

Ethan Mollick

Publisher Resources

ISBN: 0738453080Purchase book