DEPLOYMENT Class
Each record in the DEPLOYMENT class defines a deployment or undeployment task for an endpoint. A deployment task includes information that the endpoint needs to deploy or undeploy a policy as required.
capamsc141
Each record in the DEPLOYMENT class defines a deployment or undeployment task for an endpoint. A deployment task includes information that the endpoint needs to deploy or undeploy a policy as required.
The key of the DEPLOYMENT class is the name of the deployment task, which is usually generated automatically.
The following definitions describe the properties contained in this class record. Most properties are modifiable and can be manipulated using selang or the administration interfaces. Non-modifiable properties are marked
informational
.- ACLDefines a list of accessors (users and groups) permitted to access the resource, and the accessors' access types.Each element in the access control list (ACL) contains the following information:
- AccessorDefines an accessor.
- AccessDefines the access authority that the accessor has to the resource.
- CATEGORYDefines one or more security categories assigned to a user or a resource.
- COMMENTDefines additional information that you want to include in the record.Privileged Access Managerdoes not use this information for authorization.Limit:255 characters.
- CREATE_TIME(Informational) Displays the date and time when the record was created.
- DAYTIMEDefines the day and time restrictions that govern when an accessor can access a resource.Use the restrictions parameter with the chres, ch[x]usr, or ch[x]grp commands to modify this property.The resolution of daytime restrictions is one minute.
- DMS_NAMEDefines the name of the DMS where the deployment task was created.
- GPOLICYDefines the name of the policy this deployment task was created for.
- GROUPSDefines the deployment package (GDEPLOYMENT) this deployment task is a member of.
- HNODEDefines the host this deployment task was created for.
- NACL
The
NACL
property of a resource is an access control list that defines the accessors that are denied authorization to a resource, together with the type of access that they are denied (for example, write). See also ACL, CALACL, PACL. Each entry in the NACL contains the following information:Accessor
Defines an accessor.
- AccessDefines the type of access that is denied to the accessor.
Use the authorize deniedaccess command, or the authorize- deniedaccess- command, to modify this property.
NOTIFY
Defines the user to be notified when a resource or user generates an audit event.
Privileged Access Manager
can email the audit record to the specified user.
Limit:
30 characters.OPERATION
Specifies the type of operation that the endpoint should perform as a result of this deployment task. Can be one of: Deploy, Undeploy.
OWNER
Defines the user or group that owns the record.
PACL
Defines a list of accessors that are permitted to access the resource when the access request is made by a specific program (or a program that matches a name-pattern) and their access types. Each element in the program access control list (PACL) contains the following information:
- AccessorDefines an accessor.
- ProgramDefines a reference to a record in the PROGRAM class, either specifically or by wildcard pattern matching.
- AccessDefines the access authority that the accessor has to the resource.
You can use wildcard characters to specify the resource in a PACL.
Use the via(
pgm
) parameter with the selang authorize command to add programs, accessors, and their access types to a PACL, You can use the authorize- command to remove accessors from a PACL.POLICY_VERSION
Defines the policy version this deployment task was created for.
RESULT_MESSAGE
Defines the output from the deployment or undeployment selang script. These are the messages selang outputs when the policy deployment or undeployment scripts are run.
RAUDIT
Defines the types of access events that
Privileged Access Manager
records in the audit log. RAUDIT derives its name from R
esource AUDIT
. Valid values are:- allAll access requests.
- successGranted access requests.
- failureDenied access requests (default).
- noneNo access requests.
Privileged Access Manager
records events on each attempted access to a resource, and does not record whether the access rules were applied directly to the resource, or were applied to a group or class that had the resource as a member.Use the audit parameter of the chres and chfile commands to modify the audit mode.
SECLABEL
Defines the security label of a user or resource.
The SECLABEL property corresponds to the label[-] parameter of the chres and ch[x]usr commands.
SECLEVEL
Defines the security level of an accessor or resource.
Note:
This property corresponds to the level[-] parameter of the ch[x]usr and chres commands.STATUS
Defines the status of the deployment task. Can be one of:
- SuccessPolicy deployed without errors.
- WarningDeployment script executed with errors.
- FailThere was an error executing the deployment task.
- No ActionThe deployment package is effectively empty so there is nothing to do.This can also be a result of the policy already being assigned to the host through a different deployment path.
- Not ExecutedPolicy verification found one or more errors in the policy.
- Out of SyncThe policy contains a variable and the variable value has changed on the endpoint.
- Pending DeploymentThe policy contains an undefined or unresolved variable.
- Pending PrerequisiteThe deployment task will be executed only after all prerequisite policies are deployed.
- Pending DependentsThe deployment task will be executed (undeploy policy) only after all dependent policies are also undeployed.
- FixThe deployment task is waiting to be deployed again.
TARGETYPE
Defines the type of host (target) to limit the policyfetcher to process only
Privileged Access Manager
deployment packages. Can be one of: UNAB, AC, None.UACC
Defines the default access authority for the resource, which indicates the access granted to accessors who are not defined to
Privileged Access Manager
or who do not appear in the ACL of the resource.Use the defaccess parameter with the chres, editres, or newres command to modify this property.
UPDATE_TIME
(Informational) Displays the date and time when the record was last modified.
UPDATE_WHO
(Informational) Displays the administrator who performed the update.
WARNING
Specifies whether Warning mode is enabled. When Warning mode is enabled on a resource, all access requests to the resource are granted, and if an access request violates an access rule, a record is written to the audit log.