Contents Integration Technologies Administration Previous Next

Setting Access Permissions for an Object (IBM Secureway)

The Administrator implements security by letting you set permissions for objects in the IBM Secureway directory. Using these permissions, you can allow or deny access to objects or groups of objects by users or classes of users. A well-planned security strategy allows users to access objects that they need to use (for example, personal subscriptions) while restricting access to sensitive information (for example, a SAS table that contains salary information).

To control access to an object, you must specify the following information:

To set permissions for an object in the directory, follow these steps:

  1. In the tree view, select an object or a folder whose permissions you want to set.

  2. Select the Set Access Permissions tool permissions tool on the toolbar. If the tool is grayed out, you cannot set permissions for the selected object.
     
    When you select the tool, the Access Control window appears.
     
    Access Control window
     
  3. The Access Control window lists all of the existing access rules for the selected object.
     
    Use the ACL Propagation pull-down menu to specify to what level the ACL rules are applied. Choose
    Unspecified
    Inherit rules, clearing any rules explicitly specified for this object.
    Propagate
    The rules apply to the object and all objects below it in the LDAP hierarchy.
    Don't Propagate
    The rules apply only to the chosen object.

     
  4. To add an access control list, select the Add button. A new subject is created with a default permission set. Specify the subject's type and distinguished name. Use the Permissions pane to specify the desired permissions.

  5. Under the Subjects pane, click the Type field to display a pull-down menu of the subject types. Select one of the following:
     
    access-id
    The rule applies to a specific user or user ID. You should then enter a distinguished name of a specific user, for example, cn=Julieb,o=Alpine Airways. Specify cn=this specifies the bindDN that matches the object's DN.
    group
    The rule applies to a group of users. You should then enter a distinguished name of a group of users, for example, cn=accounting,o=Alpine Airways. Enter cn=anybody in the Distinguished Name field to specify all users, including unauthenticated users. Enter cn=authenticated to specify any DN that has been authenticated to the directory.
    role
    The rule applies to a specific user role. You should then enter the distinguished name of a defined access role, for example, cn=administrator,o=Alpine Airways.

  6. Double-click in the Distinguished Name field to enter the DN of the subject as detailed above.

  7. To specify the permissions for a subject, select the subject in the Subject pane, then select the tabs in the Permissions pane.
     
  8. Under the Permissions pane, select the Objects tab. Specify the following:
     
    Add child
    Specify Unspecified, Grant or Deny. This access control determines whether the subject is allowed to add an object under the current object in the LDAP hierarchy. Choose Unspecified if you want to inherit this setting.
    Delete Entry
    Specify Unspecified, Grant or Deny. This access control determines whether the subject is allowed to delete the object from the LDAP directory. Choose Unspecified if you want to inherit this setting.

  9. To define class level permissions, select the Class tab in the Permissions pane.
     
    Access Control window
     
    Classes are groups of attributes for the object. For example, the userpassword attribute is a member of the Critical class, while the commonName attribute is a member of the Normal class.

  10. For each class listed, specify whether the subject is granted or denied read, write, search and compare access for the attributes in the class. Choose Unspecified to inherit the access control setting. Details of the permissions are as follows:
     
    Read
    Directory data may be read.
    Write
    Directory data may be changed, created, or deleted.
    Search
    Directory data may be searched. For example, denying search rights for a user login object prevents users from searching for a particular user login name.
    Compare
    Directory data may be used for comparisons. Unlike searches, the information is not displayed as a result of the comparison; only an indication as to whether the search was successful is returned.

  11. To define permissions for specific attributes, select the Attributes tab in the Permissions pane.
     
    Access Control window
     
    Select an attribute from the Define an Attribute pull down menu and select Define. Select whether the subject should be granted or denied read, write, search and compare access for the specified attribute. Choose Unspecified to inherit the access control setting.

  12. To define the owner of the object, select the Owners tab.
     
    Access Control window
     
    Specify the following:
     
    Owner Propagation
    Use the pull-down menu to specify whether the owner of the object is also the owner of all objects under it in the LDAP hierarchy. Select Propagate to specify that the owner also owns the other objects; select Don't Propagate to specify that the owner only owns the current object. Select Unspecified to inherit this access control setting.
    Subjects
    Specify who has full access to the object regardless of the ACL rules. To add an owner, select Add. Use the Type pull-down menu to specify whether the owner is a specific user (access-id), a group of users (group), or a type of user (role). Enter the owner's distinguished name in the Distinguished Name field.

  13. Select Apply to apply the defined access controls and leave the Access Control window open. Select OK to apply the access control and close the Access Control window.
     
    NOTE: If any items in the tree view were expanded when you opened the Access Controls window, they are all collapsed when you return to the main Administrator window.

Contents Integration Technologies Administration Previous Next