POP commands
A protected object is accessible to a requester if the requester possesses the traverse permission on each ACL attached to container objects above the requested resource on the path towards root and including root.
Additionally, use the pdadmin command to learn which POP (if any) within your protected object space hierarchy controls access to the protected resource in question.
If a POP is directly attached to the protected object in question, this POP defines the POP policy for that object. If a POP is not directly attached to the protected object in question, the controlling POP is the nearest one that is above it in the protected object hierarchy.
- Listing POPs
- The following command lists all of the POPs which are
defined
for Security Verify Access:
padmin> pop list - Finding POPs
- The following command enables you to learn where a particular POP is attached within the protected object space hierarchy:
pdadmin> pop find pop_name - Showing POPs
- Examine the controlling
POP with the following command to ensure
that it is correct for the type of enforcement desired:
pdadmin> pop show pop_nameCorrect the POP definition if needed.