Host Protection by Name (HOSTNP) Properties

Use the Host Protection by Name (HOSTNP class) properties windows for creating, modifying, or viewing a record of this class. Each record defines the access rules that govern the access that other stations (hosts) have to the local host when using IPv4. To access the local host, the other stations (hosts) must match the name pattern in the record. For each mask, the ACL lists the service rules that govern the services that the local host provides to a group of hosts.
cminderpim14
Use the Host Protection by Name (HOSTNP class) properties windows for creating, modifying, or viewing a record of this class. Each record defines the access rules that govern the access that other stations (hosts) have to the local host when using IPv4. To access the local host, the other stations (hosts) must match the name pattern in the record. For each mask, the ACL lists the service rules that govern the services that the local host provides to a group of hosts.
This window contains the following fields in the General tab:
  • Name
    Defines the name of the resource. Indicates the name pattern to filter host names that this record protects.
  • Comment
    Defines extra information that you want to include in the record. CA Privileged Identity Manager does not use this information for authorization.
    Limit:
     255 alphanumeric characters
  • Owner
    Defines the owner of a record.
This window contains the following fields in the Authorize tab:
  • Accessors
    Defines the access control list (ACL) for the resource. The list specifies services that a local host provides to the hosts that match the name pattern mask with a specified access authority.
    Each element in the access control list contains the following information:
    • Service/Port Name
      Defines the service name or the port number of a service that the local host provides to the hosts that match the name pattern mask.
    • ACL
      Defines the access authority that the accessor has to the resource.
This window contains the following fields in the Audit tab:
  • Audit Modes
    Defines the types of access events that CA Privileged Identity Manager records in the audit log. You can select any combination of the following activities:
    • Audit Success
      Granted access requests.
    • Audit Failure
      Denied access requests (default).
    • Warning Mode
      Specifies whether Warning mode is enabled. When Warning mode is enabled on a resource, all resource access requests are granted. If an access request violates an access rule, a record is written to the audit log.
This window contains the following fields in the Time Restrictions tab:
  • Days Restriction
    Defines the native day restrictions that govern when an accessor can access the resource.
  • Restrictions
    Defines the native time restrictions that govern when an accessor can access the resource.
This window contains the following fields in the Information tab:
  • Update Time
    Displays the date and time when the record was last modified.
  • Updated By
    Displays the administrator who performed the update.
  • Create Time
    Indicate the date and time when a record gets created.