IBM DataPower Handbook Volume V: DataPower Security Hardening by Bill Hines & Derek Doerr & Terrill Kramer & Len McWilliams

IBM DataPower Handbook Volume V: DataPower Security Hardening by Bill Hines & Derek Doerr & Terrill Kramer & Len McWilliams

Author:Bill Hines & Derek Doerr & Terrill Kramer & Len McWilliams
Language: eng
Format: mobi
Publisher: Wild Lake Press
Published: 2016-07-12T22:00:00+00:00


Listing 2-4 ISSM User Group Access Profile for the ISSM Log Target.

"*/*/*?Access=r"

"*/default/logging/target?Name=ISSMLogTarget&Access=r+w+a+d+x"

These access profiles provide group members with read-only access to all application domains and full permissions with the log target named ISSMLogTarget. Alternatively, these ISSMLogTarget Access profiles could be added to another, pre-existing user group to which ISSM users already belong.

Finally, modify all other user groups such that other users are limited to read-only access to the ISSM log target. Add the following access profile to the non-ISSM user groups.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.