Describes how to modify a security policy.
| Description | The description of the policy. The maximum length of the description is 128 characters. |
| Enable Wire-level Encryption | The wire-level encryption setting. You can enable (Yes) or disable (No) wire-level encryption by moving the slider. |
| Enable Audit Operations | The audit setting for files, directories, tables, and streams. You can enable (Yes) or disable (No) auditing of operations on files, directories, tables, and streams by moving the slider. |
| Audit Operations | (Visible only if auditing is enabled) The list of file, directory, table, and stream operations to audit. You can select the default list of operations to audit by choosing the Default radio button or select specific file, directory, table, and streams operations to audit by choosing the Custom radio button. |
| Allow Tagging | The setting to allow (Yes) or disable (No) tagging for this security policy. If Yes, users can tag data objects with this policy. If No, users cannot tag data objects with this security policy. See Changing the State of a Security Policy for more information. |
, which you can then modify.
.
.
, the Add Access
Permission window displays. You can:For more information on how to build the custom access control expression, see Managing Access Control Expressions.
| Object | Permission |
|---|---|
| Directories |
|
| Files |
|
readaces property in the
CLI.writeaces property in the
CLI.This is the same as the
executefileace property in the
CLI.
, which you can then modify.
./opt/mapr/bin/maprcli security policy modify -name <policyName> -jsoncurl -k -X POST 'https://<host>:port/rest/security/policy/modify?name=<policyName>' --user mapr:mapr