Class CIM_AssociatedPrivilege

(Association)
CIM_AssociatedPrivilege is an association that models the privileges that a Subject element has to access or authorize other elements to access a Target element.
Details...
This class is not implemented.

Class Qualifiers

NameData TypeValueScopeFlavors
AssociationbooleantrueNone OVERRIDABLE= false
DescriptionstringCIM_AssociatedPrivilege is an association that models the privileges that a Subject element has to access or authorize other elements to access a Target element.None TRANSLATABLE= true
ExperimentalbooleantrueTOSUBCLASS= falseNone
UMLPackagePathstringCIM::User::PrivilegeNone None
Versionstring2.19.0TOSUBCLASS= falseTRANSLATABLE= true

Local Class Properties

NameData TypeQualifiers
NameData TypeValueScopeFlavors
Activitiesuint16
ArrayTypestringIndexedNone OVERRIDABLE= false
DescriptionstringAn enumeration indicating the activities that are granted or denied. These activities apply to all entities specified in the ActivityQualifiers array. The values in the enumeration are straightforward except for one, 4="Detect". This value indicates that the existence or presence of an entity may be determined, but not necessarily specific data (which requires the Read privilege to be true). This activity is exemplified by 'hidden files'- if you list the contents of a directory, you will not see hidden files. However, if you know a specific file name, or know how to expose hidden files, then they can be 'detected'. Another example is the ability to define search privileges in directory implementations.None TRANSLATABLE= true
ModelCorrespondencestringCIM_AssociatedPrivilege.ActivityQualifiersNone None
ValueMapstring1, 2, 3, 4, 5, 6, 7, .., 16000..None None
ValuesstringOther, Create, Delete, Detect, Read, Write, Execute, DMTF Reserved, Vendor ReservedNone TRANSLATABLE= true
ActivityQualifiersstring
ArrayTypestringIndexedNone OVERRIDABLE= false
DescriptionstringThe ActivityQualifiers property is an array of string values used to further qualify and specify the privileges granted or denied. For example, it is used to specify a set of files for which 'Read'/'Write' access is permitted or denied. Or, it defines a class' methods that may be 'Executed'. Details on the semantics of the individual entries in ActivityQualifiers are provided by corresponding entries in the QualifierFormats array.None TRANSLATABLE= true
ModelCorrespondencestringCIM_AssociatedPrivilege.Activities, CIM_AssociatedPrivilege.QualifierFormatsNone None
PrivilegeGrantedboolean
DescriptionstringBoolean indicating whether the Privilege is granted (TRUE) or denied (FALSE). The default is to grant permission.None TRANSLATABLE= true
QualifierFormatsuint16
ArrayTypestringIndexedNone OVERRIDABLE= false
DescriptionstringDefines the semantics of corresponding entries in the ActivityQualifiers array. An example of each of these 'formats' and their use follows: - 2=Class Name. Example: If the authorization target is a CIM Service or a Namespace, then the ActivityQualifiers entries can define a list of classes that the authorized subject is able to create or delete. - 3=<Class.>Property. Example: If the authorization target is a CIM Service, Namespace or Collection of instances, then the ActivityQualifiers entries can define the class properties that may or may not be accessed. In this case, the class names are specified with the property names to avoid ambiguity - since a CIM Service, Namespace or Collection could manage multiple classes. On the other hand, if the authorization target is an individual instance, then there is no possible ambiguity and the class name may be omitted. To specify ALL properties, the wildcard string "*" should be used. - 4=<Class.>Method. This example is very similar to the Property one, above. And, as above, the string "*" may be specified to select ALL methods. - 5=Object Reference. Example: If the authorization target is a CIM Service or Namespace, then the ActivityQualifiers entries can define a list of object references (as strings) that the authorized subject can access. - 6=Namespace. Example: If the authorization target is a CIM Service, then the ActivityQualifiers entries can define a list of Namespaces that the authorized subject is able to access. - 7=URL. Example: An authorization target may not be defined, but a Privilege could be used to deny access to specific URLs by individual Identities or for specific Roles, such as the 'under 17' Role. - 8=Directory/File Name. Example: If the authorization target is a FileSystem, then the ActivityQualifiers entries can define a list of directories and files whose access is protected. - 9=Command Line Instruction. Example: If the authorization target is a ComputerSystem or Service, then the ActivityQualifiers entries can define a list of command line instructions that may or may not be 'Executed' by the authorized subjects. - 10=SCSI Command, using a format of 'CDB=xx[,Page=pp]'. For example, the ability to select the VPD page of the Inquiry command is encoded as 'CDB=12,Page=83' in the corresponding ActivityQualifiers entry. A '*' may be used to indicate all CDBs or Page numbers. - 11=Packets. Example: The transmission of packets is permitted or denied by the Privilege for the target (a ComputerSystem, ProtocolEndpoint, Pipe, or other ManagedSystemElement).None TRANSLATABLE= true
ModelCorrespondencestringCIM_AssociatedPrivilege.ActivityQualifiersNone None
ValueMapstring2, 3, 4, 5, 6, 7, 8, 9, 10, 11, .., 16000..None None
ValuesstringClass Name, <Class.>Property, <Class.>Method, Object Reference, Namespace, URL, Directory/File Name, Command Line Instruction, SCSI Command, Packets, DMTF Reserved, Vendor ReservedNone TRANSLATABLE= true
RepresentsAuthorizationRightsboolean
DescriptionstringThe RepresentsAuthorizationRights flag indicates whether the rights defined by this instance shall be interpreted as rights of Subjects to access Targets or as rights of Subjects to change those rights on/for Targets.None TRANSLATABLE= true
UseKeystring
DescriptionstringUseKey is used to distinguish instances in case multiple instances of this association exist between the same Subject and Target. This may arise, for example, if separate instances are created for each management domain, or if the Subject has access and authorization rights to the Target. Within the scope of the instantiating Namespace, UseKey opaquely and uniquely identifies an instance of this class. In order to ensure uniqueness within the NameSpace, the value of UseKey should be constructed using the following 'preferred' algorithm: <OrgID>:<LocalID> Where <OrgID> and <LocalID> are separated by a colon ':', and where <OrgID> shall include a copyrighted, trademarked or otherwise unique name that is owned by the business entity creating/defining the UseKey, or is a registered ID that is assigned to the business entity by a recognized global authority. (This is similar to the <Schema Name>_<Class Name> structure of Schema class names.) In addition, to ensure uniqueness <OrgID> shall not contain a colon (':'). When using this algorithm, the first colon to appear in UseKey shall appear between <OrgID> and <LocalID>. <LocalID> is chosen by the business entity and should not be re-used to identify different underlying (real-world) elements. If the above 'preferred' algorithm is not used, the defining entity shall assure that the resultant UseKey is not re-used across any UseKeys produced by this or other providers for this instance's NameSpace. For DMTF defined instances, the 'preferred' algorithm shall be used with the <OrgID> set to 'CIM'.None TRANSLATABLE= true
KeybooleantrueNone OVERRIDABLE= false

Association References

NameClass OriginReference Class
SubjectCIM_AssociatedPrivilegeCIM_ManagedElement
TargetCIM_AssociatedPrivilegeCIM_ManagedElement

Copyright © 2008-2010 VMware, Inc. All rights reserved.