Describes how to create a security policy using the Control System, CLI, and REST API.
Administrators with cluster-level cp (create security policy) permission can create security
policies from the Control System, CLI, and REST API. Before creating security
policies, you must first set a cluster as the global
policy master. After you create the policy, as the owner of the policy,
you can edit all parts of the policy, including the Access Control Expression (ACE)s on the policy. When you create
a security policy, the policy is in a disarmed state with the
AllowTagging setting set to false, by default,
which makes the policy unavailable for tagging. You can modify the policy state to
make it available for tagging. See Changing the State of a Security Policy for more
information.
to display the Security page.
-),
and underscore (_). The maximum length of the
security policy name is 32 characters.Public or customize the access
permissions. Setting the Public slider to Yes, makes this policy accessible
to everyone. Leave this slider at its default setting of No to cutomize
access permissions.| Object | Permission |
|---|---|
| Directories |
|
| Files |
|
readaces
property in the CLI.writeaces
property in the CLI.This is the same as the
executefileace property in the
CLI.
to create a copy of the data access
controls, which can then be modified by clicking
.
to create a copy of the access
control./opt/mapr/bin/maprcli security policy create -name <policyName>curl -k -X POST 'https://<hostname>:8443/rest/security/policy/create?name=<policyName>" --user mapr:maprpolicy create.