GHNODE Class
Each record in the GHNODE class defines a host group-a group of hosts (HNODE objects). You must create a HNODE class record for each host before adding it to a GHOST record.
capamsc141
Each record in the GHNODE class defines a host group-a group of hosts (HNODE objects). You must create a HNODE class record for each host before adding it to a GHOST record.
This class is used to manage policy deployment and assignment.
The key of the GHNODE class record is a logical name for the host group.
The following definitions describe the properties contained in this class record. Most properties are modifiable and can be manipulated using selang or the administration interfaces. Non-modifiable properties are marked
informational
.- ACLDefines a list of accessors (users and groups) permitted to access the resource, and the accessors' access types.Each element in the access control list (ACL) contains the following information:
- AccessorDefines an accessor.
- AccessDefines the access authority that the accessor has to the resource.
- COMMENTDefines additional information that you want to include in the record.PAM Server Controldoes not use this information for authorization.Limit:255 characters.
- CREATE_TIME(Informational) Displays the date and time when the record was created.
- CRITERIADefines the criteria that the DMS uses to automatically add hosts to this host group. You can specify criteria that matches or excludes the following HNODE properties: ATTRIBUTES, COMMENT, HNODE_INFO, HNODE_IP, HNODE_VERSION, NODE_TYPEFor example, the HNODE records for Windows endpoints have the property HNODE_INFO=Windows. If the CRITERIA property for a GHNODE record has the value of HNODE_INFO=Windows, the DMS automatically adds any new Windows HNODE to the GHNODE.
- GROUPSDefines the list of CONTAINER records that a resource record belongs to.To modify this property in a class record, change the MEMBERS property in the appropriate CONTAINER record.Use the mem+ or mem- parameter with the chres, editres or newres command to modify this property.
- MEMBERSThe list of objects from the HNODE class that are members of the group.Use the mem+ or mem- parameter with the chres, editres, and newres commands to modify this property.
- NACL
The
NACL
property of a resource is an access control list that defines the accessors that are denied authorization to a resource, together with the type of access that they are denied (for example, write). See also ACL, CALACL, PACL. Each entry in the NACL contains the following information:Accessor
Defines an accessor.
- AccessDefines the type of access that is denied to the accessor.
Use the authorize deniedaccess command, or the authorize- deniedaccess- command, to modify this property.
OWNER
Defines the user or group that owns the record.
POLICIES
The list of policies that should be deployed on this object.
POLICYASSIGN
Defines the list of policies that are assigned to this object.
Display name: Assigned Policies
RAUDIT
Defines the types of access events that
PAM Server Control
records in the audit log. RAUDIT derives its name from R
esource AUDIT
. Valid values are:- allAll access requests.
- successGranted access requests.
- failureDenied access requests (default).
- noneNo access requests.
PAM Server Control
records events on each attempted access to a resource, and does not record whether the access rules were applied directly to the resource, or were applied to a group or class that had the resource as a member.Use the audit parameter of the chres and chfile commands to modify the audit mode.
UACC
Defines the default access authority for the resource, which indicates the access granted to accessors who are not defined to
PAM Server Control
or who do not appear in the ACL of the resource.Use the defaccess parameter with the chres, editres, or newres command to modify this property.
UPDATE_TIME
(Informational) Displays the date and time when the record was last modified.
UPDATE_WHO
(Informational) Displays the administrator who performed the update.
WARNING
Specifies whether Warning mode is enabled. When Warning mode is enabled on a resource, all access requests to the resource are granted, and if an access request violates an access rule, a record is written to the audit log.