Contents for Policy Managers Guide
About this Document
Audience for this Guide
Prerequisites for this Guide
How this Document is Organized
Product Documentation on the dev2dev Web Site
Related Information
Contact Us!
Modeling Policies
Policy Overview
Security Configuration
Authentication Policy
Users and Groups
Identity Attributes
Role Mapping Policy
Authorization Policy
Defining Resources
Resource Attributes
Privileges
Conditions
Delegation
Auditing Policy
Defining Rules
Overview of Securing Resources
Designing and Writing Rules
Rule Structure
Group Inheritance
Direct and Indirect Group Membership
Closed-world Assumption
Group Hierarchy Examples
Restricting Rule Inheritance
Resource Attribute Inheritance
Constraints
Declarations
Type Declarations
Constant Declarations
Evaluation Function Declarations
Attribute Declarations
Writing Policy for Web Server Web Applications
Resource Format
Action Format
Application Context
Using Named Keys in the Web Application Policy
Web Application Context Handler
Retrieval of Response Attributes
Designing More Advanced Rules
Multiple Components
Rule Constraints
Comparison Operators
Regular Expressions
Constraint Sets
String Comparisons
Complex Rule Constraints
Boolean Operators
Associativity and Precedence
Grouping with Parentheses
Boolean Operators and Constraint Sets
Using Response Attributes
report() Function
report_as() Function
Report Function Rules Language
Using Evaluation Plug-ins to Specify Response Attributes
Using queryResources and grantedResources
Creating Policy Data Files
Policy Data Files
Policy Element Naming
Fully Qualified Names
Policy Element Qualifiers
Size Restriction on Policy Data
Character Restrictions in Policy Data
Data Normalization
Directory Names
Logical Name
Declaration Names
Special Names and Abbreviations
Sample Policy Files
Application Bindings
Attribute [attr]
Declarations
Directories
Directory Attribute Schemas
Mutually Exclusive Subject Groups [excl]
Resources
Resource Attributes
Policy Distribution
Policy Inquiry
Policy Verification
Privileges
Privilege Bindings
Privilege Groups
Roles
Rules
Security Providers
Subject Group Membership [member]
Subjects [subject]
Resource Discovery
Subject Transformation
Resource Transformation
WebLogic Resource Transformation
Java API Resource Transformation
Action Transformation
Attribute Transformations
What's Next?
Importing Policy Data
Policy Import Tool
Configuring the Policy Import Tool
Setting Configuration Parameters
Username and Password
Policy Import Parameters
StopOnError Parameter
Sample Configuration File
Running the Policy Import Tool
Errors that Halt the Policy Importing Process
Exporting Policy Data
Policy Exporter Tool
Before You Begin
Exporting Policy Data on Unix Platforms
Exporting Policy Data on Windows Platforms
What's Next