IBM DataPower Handbook Volume V: DataPower Security Hardening by Hines Bill & Doerr Derek & Kramer Terrill & McWilliams Len

IBM DataPower Handbook Volume V: DataPower Security Hardening by Hines Bill & Doerr Derek & Kramer Terrill & McWilliams Len

Author:Hines, Bill & Doerr, Derek & Kramer, Terrill & McWilliams, Len [Hines, Bill]
Language: eng
Format: azw3, epub
Publisher: Wild Lake Press
Published: 2016-07-13T04:00:00+00:00


Listing 2-4 ISSM User Group Access Profile for the ISSM Log Target.

"*/*/*?Access=r"

"*/default/logging/target?Name=ISSMLogTarget&Access=r+w+a+d+x"

These access profiles provide group members with read-only access to all application domains and full permissions with the log target named ISSMLogTarget. Alternatively, these ISSMLogTarget Access profiles could be added to another, pre-existing user group to which ISSM users already belong.

Finally, modify all other user groups such that other users are limited to read-only access to the ISSM log target. Add the following access profile to the non-ISSM user groups.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.