Host Protection by Name (HOSTNP) Properties
Use the Host Protection by Name (HOSTNP class) properties windows for creating, modifying, or viewing a record of this class. Each record defines the access rules that govern the access that other stations (hosts) have to the local host when using IPv4. To access the local host, the other stations (hosts) must match the name pattern in the record. For each mask, the ACL lists the service rules that govern the services that the local host provides to a group of hosts.
cminderpim14
Use the Host Protection by Name (HOSTNP class) properties windows for creating, modifying, or viewing a record of this class. Each record defines the access rules that govern the access that other stations (hosts) have to the local host when using IPv4. To access the local host, the other stations (hosts) must match the name pattern in the record. For each mask, the ACL lists the service rules that govern the services that the local host provides to a group of hosts.
This window contains the following fields in the General tab:
- NameDefines the name of the resource. Indicates the name pattern to filter host names that this record protects.
- CommentDefines extra information that you want to include in the record. CA Privileged Identity Manager does not use this information for authorization.Limit:255 alphanumeric characters
- OwnerDefines the owner of a record.
This window contains the following fields in the Authorize tab:
- AccessorsDefines the access control list (ACL) for the resource. The list specifies services that a local host provides to the hosts that match the name pattern mask with a specified access authority.Each element in the access control list contains the following information:
- Service/Port NameDefines the service name or the port number of a service that the local host provides to the hosts that match the name pattern mask.
- ACLDefines the access authority that the accessor has to the resource.
This window contains the following fields in the Audit tab:
- Audit ModesDefines the types of access events that CA Privileged Identity Manager records in the audit log. You can select any combination of the following activities:
- Audit SuccessGranted access requests.
- Audit FailureDenied access requests (default).
- Warning ModeSpecifies whether Warning mode is enabled. When Warning mode is enabled on a resource, all resource access requests are granted. If an access request violates an access rule, a record is written to the audit log.
This window contains the following fields in the Time Restrictions tab:
- Days RestrictionDefines the native day restrictions that govern when an accessor can access the resource.
- RestrictionsDefines the native time restrictions that govern when an accessor can access the resource.
This window contains the following fields in the Information tab:
- Update TimeDisplays the date and time when the record was last modified.
- Updated ByDisplays the administrator who performed the update.
- Create TimeIndicate the date and time when a record gets created.