...
Field | Description |
---|---|
Event Management Options | Delete Persistent events after |
Event Generation Options | |
Field | Description |
Access Control List | Displays the entries contained in the Universal Broker Access Control List (ACL). This list is used to grant or deny access to Universal Broker based on the Generate Activity monitoring events Entries are processed from left to right, and the list is order dependent. For example, an entry of x*,100 prevents generation of all event types except 100, while an entry of 100,x* prevents generation of all event types (the right-most entry takes precedence). |
Universal Broker: Access Control Lists
Universal Broker: Access Control Lists - Access ACL
Entries are processed from left to right, and the list is order dependent. For example, an entry of x*,100 prevents generation of all event types except 100, while an entry of 100,x* prevents generation of all event types (the right-most entry takes precedence). |
Universal Broker: Access Control Lists
Universal Broker: Access Control Lists - Access ACL
Field | Description |
---|---|
Access Control List | Displays the entries contained in the Universal Broker Access Control List (ACL). This list is used to grant or deny access to Universal Broker based on the remote system's IP address. The order in which ACL entries are evaluated and applied are based on their position in this list. Use the Move Up and Move Down buttons to change an entry's priority. |
Add Button | Displays a dialog box that allows an entry to be added to the Access Control List. The fields in this dialog are populated with default values. |
Edit Button | Displays a dialog that allows the selected Access Control List entry to be modified. |
Delete Button | Removes the selected item from the Access Control List. |
Move Up Button | Moves the selected item up one position in the list. |
Move Down Button | Moves the selected item down one position in the list. |
...
Field | Description | ||||||
---|---|---|---|---|---|---|---|
Certificate Map ACL List Box | Displays the entries contained in the X.509 certificate mapping. The order in which entries are evaluated and applied are based on their position in this list. Use the Move Up and Move Down buttons to change an entry's priority. | ||||||
Add Button | Displays a dialog box that allows an entry to be added to the Access Control List. The fields in this dialog are populated with default values. The following are examples of Distinguished Names: E-Mail AddressThe value entered here is used to match an installed X.509 certificate by comparing the dNSName of the subjectAltName extension value or the commonName (CN) Relative Distinguished Name attribute of a Distinguished Name's subject field. The host name entered here may contain wildcards. For example, *.acme.com. Host Name The value entered here is used to match an installed X.509 certificate by comparing the dNSName of the subjectAltName extension value or the commonName (CN) Relative Distinguished Name attribute of a Distinguished Name's subject field. The host name entered here may contain wildcards. For example, *.acme.com. IP Address The value entered here is used to match an installed X.509 certificate by comparing the iPAddress of the subjectAltName extension value. The IP Address entered must be in dotted decimal format (i.e., xx.xx.xx.xx). Serial Number
The following are examples of Distinguished Names:
E-Mail Address | Edit Button | Displays a dialog that allows the selected Access Control List entry to be modified. | ||||
Edit Button | Displays a dialog that allows the selected Access Control List entry to be modified.
The following are examples of Distinguished Names:
E-Mail Address | ||||||
Delete Button | Removes the selected item from the Access Control List. | ||||||
Move Up Button | Moves the selected item up one position in the list. | ||||||
Move Down Button | Moves the selected item down one position in the list. |
...