Licensed to the Apache Software Foundation (ASF) under one or more contributor license agreements. See the NOTICE file distributed with this work for additional information regarding copyright ownership. The ASF licenses this file to you under the Apache License, Version 2.0 (the “License”); you may not use this file except in compliance with the License. You may obtain a copy of the License at

 http://www.apache.org/licenses/LICENSE-2.0

Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an “AS IS” BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.

README for Apache Fortress REST Security Model

Apache Fortress Rest Security Model

/home/smckinn/GIT/fortressDev/directory-fortress-enmasse/images/ApacheFortressRestSecurityModel.png


Table of Contents

  • Document Overview
  • Understand the security model of Apache Fortress Rest
    1. TLS
    1. Java EE security
    1. Apache CXF's SimpleAuthorizingInterceptor
    1. Apache Fortress ARBAC02 Checks
    1. Java EE security and Apache CXF SimpleAuthorizingInterceptor policy load
    1. ARBAC policy load
    1. The list of Services that enforce ARBAC02

Document Overview

Provides a description of the various security mechanisms that are performed during Apache Fortress REST runtime operations.


Understand the security model of Apache Fortress Rest

  • Apache Fortress Rest is a JAX-RS Web application that allows the Apache Fortress Core APIs to be called over an HTTP interface.
  • It deploys inside of any compliant Java Servlet container although here we'll be using Apache Tomcat.

Apache Fortress Rest security model includes:

1. TLS

Nothing special or unique going on here. Refer to the documentation of your servlet container for how to enable.


2. Java EE security

  • Apache Fortress Rest uses the Apache Fortress Realm to provide Java EE authentication, coarse-grained authorization mapping the users and roles back to a given LDAP server.
  • The policy for Apache Fortress Rest is simple. Any user with the fortress-rest-user role and correct credentials is allowed in.
  • The Fortress Rest interface uses HTTP Basic Auth tokens to send the userid/password.

3. Apache CXF's SimpleAuthorizingInterceptor

This policy enforcement mechanism maps RBAC roles to a given set of services. The following table shows what roles map to which (sets of) services:

service typefortress-rest-super-userfortress-rest-admin-userfortress-rest-review-userfortress-rest-access-userfortress-rest-deladmin-userfortress-rest-delreview-userfortress-rest-delaccess-userfortress-rest-pwmgr-userfortress-rest-audit-userfortress-rest-config-user
Admin Managertruetruefalsefalsefalsefalsefalsefalsefalsefalse
Review Managertruefalsetruefalsefalsefalsefalsefalsefalsefalse
Access Managertruefalsefalsetruefalsefalsefalsefalsefalsefalse
Delegated Admintruefalsefalsefalsetruefalsefalsefalsefalsefalse
Delegated Reviewtruefalsefalsefalsefalsetruefalsefalsefalsefalse
Delegated Accesstruefalsefalsefalsefalsefalsetruefalsefalsefalse
Password Managertruefalsefalsefalsefalsefalsefalsetruefalsefalse
Audit Managertruefalsefalsefalsefalsefalsefalsefalsetruefalse
Config Managertruefalsefalsefalsefalsefalsefalsefalsefalsetrue

4. Apache Fortress ARBAC02 Checks

Disabled by default. To enable, add this to fortress.properties file and restart instance:

# Boolean value. Disabled by default. If this is set to true, the runtime will enforce administrative permissions and ARBAC02 DA checks:
is.arbac02=true

The ARBAC checks when enabled, include the following:

a. All service invocations, except AccessMgr and DelAccessMgr, perform an ADMIN permission check automatically corresponding with the exact service/API being called.

For example, the permission with an objectName: org.apache.directory.fortress.core.impl.AdminMgrImpl and operation name: addUser is automatically checked during the call to the userAdd service.

This means at least one ADMIN role must be activated for the user calling the service that has been granted the required permission. The entire list of permissions, and their mappings to services are listed in the table that follows.

b. Some services (#'s 1 - 12 listed below) perform organizational verification, comparing the org on the ADMIN role with that on the target user or permission in the HTTP request. There are two types of organizations being checked, User and Permission.

For example, roleAsgn and roleDeasgn (9 and 10 below) will verify that the caller has an ADMIN role with a user org unit that matches the ou of the target user.
There is a similar check on roleGrant and roleRevoke (11 and 12) verifying the caller has an activated ADMIN role with a perm org unit that matches the ou on the target permission.

c. Some services (#'s 9,10,11,12) perform a range check on the target RBAC role to verify user has matching ADMIN role with authority to assign to user or grant to permission. The Apache Fortress REST roleAsgn, roleDeasgn, roleGrant and roleRevoke services will enforce ADMIN authority over the particular RBAC role that is being targeted in the HTTP request. These checks are based on a (hierarchical) range of roles, for which the target role must fall inside.

For example, the following top-down contains a sample RBAC role hierarchy for a fictional software development organization:

       CTO
        |
    |       |
   ENG      QC
  |   |   |    |   
 E1   E2  Q1   Q2
    |        |
   DA        QA
        |
        A1

Here a role called CTO is the highest ascendant in the graph, and A1 is the lowest descendant. In a top-down role hierarchy, privilege increases as we descend downward. So a person with role A1 inherits all that are above.

In describing a range of roles, beginRange is the lowest descendant in the chain, and endRange the highest. Furthermore a bracket, ‘[’, ‘]’, indicates inclusiveness with an endpoint, whereas parenthesis, ‘(’, ‘)’ will exclude a corresponding endpoint.

Some example ranges that can be derived from the sample role graph above:

  • [A1, CTO] is the full set: {CTO, ENG, QC, E1, E2, Q1, Q2, DA, QA, A1}.
  • (A1, CTO) is the full set, minus the endpoints: {ENG, QC, E1, E2, Q1, Q2, DA, QA}.
  • [A1, ENG] includes: {A1, DA, E1, E2, ENG},
  • [A1, ENG) includes: {A1, DA, E1, E2}.
  • (QA, QC] has {Q1, Q2, QC} in its range.
  • etc...

For an administrator to be authorized to target an RBAC role in one of the specified APIs listed above, at least one of their activated ADMIN roles must pass the ARBAC role range test. There are currently two roles created by the security policy in this project, that are excluded from this type of check: fortress-rest-admin and fortress-core-super-admin.

Which means they won't have to pass the role range test. All others use the range field to define authority over a particular set of roles, in a hierarchical structure.

5. Java EE security and Apache CXF SimpleAuthorizingInterceptor policy load

a. The policy load file in this section performs the following:

  • Creates an RBAC role, fortress-rest-user for Java EE simple role check (described earlier). See web.xml.
  • Create the roles for corresponding Apache CXF SimpleAuthorizingInterceptor checks (also described earlier). See FortressInterceptor.
    • For example...
    • Users assigned to fortress-rest-admin-user have access to every RBAC admin service.
    • " " fortress-rest-review-user have access to every RBAC review services.
    • " " fortress-rest-deladmin-user have access to every ARBAC admin services.
    • etc...
  • Create an RBAC Role, fortress-rest-power-user, and make it the child of every other RBAC role.
    • Users assigned to this role have access to every service.
  • Create a test user, demoUser4, assign to fortress-rest-power-user RBAC role.

b. Execute the policy load FortressRestServerPolicy into LDAP:

mvn install -Dload.file=src/main/resources/FortressRestServerPolicy.xml

c. Now demoUser4 may execute every service and pass the JavaEE and Apache CXF interceptor checks.

6. ARBAC policy load

a. The ARBAC policies are enforced when the following property is present in runtime fortress.properties:

# Boolean value. Disabled by default. If this is set to true, the runtime will enforce administrative permissions and ARBAC02 DA checks:
is.arbac02=true

b. The policy load file in this section Creates an Admin RBAC (ARBAC) Role named: fortress-rest-admin, and associates with (Test) Perm and User OU's:

PermOUs="APP0,APP1,APP2,APP3,APP4,APP5,APP6,APP7,APP8,APP9,APP10,
     oamT3POrg8,oamT3POrg9,oamT3POrg1,oamT3POrg10,oamT3POrg2,
     oamT3POrg3,oamT3POrg4,oamT3POrg5,oamT3POrg6,oamT3POrg7,
     oamT3POrg8,oamT4POrg1,oamT4POrg10,oamT4POrg2,oamT4POrg3,
     oamT4POrg4,oamT4POrg5,oamT4POrg6,oamT4POrg7,oamT4POrg8,
     oamT4POrg9,T5POrg1,T5POrg2,T5POrg3,T5POrg4,T5POrg5,T6POrg1,
     T6POrg2,T6POrg3,T6POrg4,T6POrg5,T6POrg6,T6POrg7,T7POrg1,T7POrg2,
     T7POrg3,T7POrg4,T7POrg5,T7POrg6,T7POrg7,"

UserOUs="DEV0,DEV1,DEV2,DEV3,DEV4,DEV5,DEV6,DEV7,DEV8,DEV9,DEV10,
     oamT1UOrg1,oamT1UOrg10,oamT1UOrg2,oamT1UOrg3,oamT1UOrg4,
     oamT1UOrg5,oamT1UOrg6,oamT1UOrg7,oamT1UOrg8,oamT1UOrg9,
     oamT2UOrg1,oamT2UOrg10,oamT2UOrg2,oamT2UOrg3,oamT2UOrg4,
     oamT2UOrg5,oamT2UOrg6,oamT2UOrg7,oamT2UOrg8,oamT2UOrg9,
     T5UOrg1,T5UOrg2,T5UOrg3,T5UOrg4,T5UOrg5,T6UOrg1,T6UOrg2,
     T6UOrg3,T6UOrg4,T6UOrg5,T6UOrg6,T6UOrg7,T7UOrg1,T7UOrg2,
     T7UOrg3,T7UOrg4,T7UOrg5,T7UOrg6,T7UOrg7"

Note: The Perm and User OUs must be created prior to the ARBAC sample load script being run. They get created during Apache Fortress Core integration testing. See FortressJUnitTest.

c. Next, the ARBAC sample policy load script performs:

  • Create one ARBAC Permission for every Apache Fortress Rest service that is secured by ARBAC02 (all but the access and config managers).
  • Grants every ARBAC Perm to the ARBAC Role fortress-rest-admin.
  • Assigns the ARBAC Role fortress-rest-admin to the test User demoUser4.
    • Users who have been granted this ARBAC role, like demoUser4, may call every Apache Fortress Rest service in this syteem and pass the ARBAC perm checks.
    • Assigned users will pass the ARBAC organizational checks for (only) the data contained within the Apache Fortress core junit tests.
    • Assigned users will pass all of the ARBAC role range checks.

d. To load the FortressRestArbacSamplePolicy into LDAP:

mvn install -Dload.file=src/main/resources/FortressRestArbacSamplePolicy.xml

e. Now demoUser4 may execute every service and pass the ARBAC checks corresponding with the test data inside of Apache Fortress Core's integration test suite.

7. The list of Services that enforce ARBAC02 checking.

#ServicesUserOU CheckPermOU CheckRole Range CheckADMIN Permissions
1userAddtruefalsefalseobjName=“org.apache.directory.fortress.core.impl.AdminMgrImpl” opName=“addUser”
2userUpdatetruefalsefalseobjName=“org.apache.directory.fortress.core.impl.AdminMgrImpl” opName=“updateUser”
3userDeletetruefalsefalseobjName=“org.apache.directory.fortress.core.impl.AdminMgrImpl” opName=“deleteUser”
4userDisabletruefalsefalseobjName=“org.apache.directory.fortress.core.impl.AdminMgrImpl” opName=“disableUser”
5userChangetruefalsefalseobjName=“org.apache.directory.fortress.core.impl.AdminMgrImpl” opName=“changePassword”
6userResettruefalsefalseobjName=“org.apache.directory.fortress.core.impl.AdminMgrImpl” opName=“resetPassword”
7userLocktruefalsefalseobjName=“org.apache.directory.fortress.core.impl.AdminMgrImpl” opName=“lockUserAccount”
8userUnlocktruefalsefalseobjName=“org.apache.directory.fortress.core.impl.AdminMgrImpl” opName=“unlockUserAccount”
9roleAsgntruefalsetrueobjName=“org.apache.directory.fortress.core.impl.AdminMgrImpl” opName=“assignUser”
10roleDeasgntruefalsetrueobjName=“org.apache.directory.fortress.core.impl.AdminMgrImpl” opName=“deassignUser”
11roleGrantfalsetruetrueobjName=“org.apache.directory.fortress.core.impl.AdminMgrImpl” opName=“grantPermission”
12roleRevokefalsetruetrueobjName=“org.apache.directory.fortress.core.impl.AdminMgrImpl” opName=“revokePermission”
13roleAddfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.AdminMgrImpl” opName=“addRole”
14roleDeletefalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.AdminMgrImpl” opName=“deleteRole”
15roleUpdatefalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.AdminMgrImpl” opName=“updateRole”
16addRoleConstraintfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.AdminMgrImpl” opName=“addRoleConstraint”
17removeRoleConstraintfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.AdminMgrImpl” opName=“removeRoleConstraint”
18roleEnableConstraintfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.AdminMgrImpl” opName=“enableRoleConstraint”
19roleDisableConstraintfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.AdminMgrImpl” opName=“disableRoleConstraint”
20permAddfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.AdminMgrImpl” opName=“addPermission”
21objAddfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.AdminMgrImpl” opName=“addPermObj”
22permDeletefalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.AdminMgrImpl” opName=“deletePermission”
23objDeletefalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.AdminMgrImpl” opName=“deletePermObj”
24permUpdatefalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.AdminMgrImpl” opName=“updatePermission”
25objUpdatefalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.AdminMgrImpl” opName=“updatePermObj”
26userGrantfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.AdminMgrImpl” opName=“grantPermissionUser”
27userRevokefalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.AdminMgrImpl” opName=“revokePermissionUser”
28roleDescendantfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.AdminMgrImpl” opName=“addDescendant”
29roleAscendentfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.AdminMgrImpl” opName=“addAscendant”
30roleAddinheritfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.AdminMgrImpl” opName=“addInheritance”
31roleDelinheritfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.AdminMgrImpl” opName=“deleteInheritance”
32ssdAddfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.AdminMgrImpl” opName=“createSsdSet”
33ssdUpdatefalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.AdminMgrImpl” opName=“updateSsdSet”
34ssdAddMemberfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.AdminMgrImpl” opName=“addSsdRoleMember”
35ssdDelMemberfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.AdminMgrImpl” opName=“deleteSsdRoleMember”
36ssdDeletefalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.AdminMgrImpl” opName=“deleteSsdSet”
37ssdCardUpdatefalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.AdminMgrImpl” opName=“setSsdSetCardinality”
38dsdAddfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.AdminMgrImpl” opName=“createDsdSet”
39dsdUpdatefalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.AdminMgrImpl” opName=“updateDsdSet”
40dsdAddMemberfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.AdminMgrImpl” opName=“addDsdRoleMember”
41dsdDelMemberfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.AdminMgrImpl” opName=“deleteDsdRoleMember”
42dsdDeletefalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.AdminMgrImpl” opName=“deleteDsdSet”
43dsdCardUpdatefalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.AdminMgrImpl” opName=“setDsdSetCardinality”
44addPermissionAttributeSetfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.AdminMgrImpl” opName=“addPermissionAttributeSet”
45deletePermissionAttributeSetfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.AdminMgrImpl” opName=“deletePermissionAttributeSet”
46addPermissionAttributeToSetfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.AdminMgrImpl” opName=“addPermissionAttributeToSet”
47permReadfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.ReviewMgrImpl” opName=“readPermission”
48objReadfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.ReviewMgrImpl” opName=“readPermObj”
49permSearchfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.ReviewMgrImpl” opName=“findPermissions”
50objSearchfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.ReviewMgrImpl” opName=“findPermObjs”
51permObjSearchfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.ReviewMgrImpl” opName=“findPermsByObj”
52roleReadfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.ReviewMgrImpl” opName=“readRole”
53roleSearchfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.ReviewMgrImpl” opName=“findRoles”
54userReadfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.ReviewMgrImpl” opName=“readUser”
55userSearchfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.ReviewMgrImpl” opName=“findUsers”
56userAsignedfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.ReviewMgrImpl” opName=“assignedUsers”
57roleAsignedfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.ReviewMgrImpl” opName=“assignedRoles”
58roleAuthzedfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.ReviewMgrImpl” opName=“authorizedRoles”
59userAuthzedfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.ReviewMgrImpl” opName=“authorizedUsers”
60rolePermsfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.ReviewMgrImpl” opName=“rolePermissions”
61userPermsfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.ReviewMgrImpl” opName=“userPermissions”
62permRolesfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.ReviewMgrImpl” opName=“permissionRoles”
63permRolesAuthzedfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.ReviewMgrImpl” opName=“authorizedPermissionRoles”
64permUsersfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.ReviewMgrImpl” opName=“permissionUsers”
65permUsersAuthzedfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.ReviewMgrImpl” opName=“authorizedPermissionUsers”
66ssdRoleSetsfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.ReviewMgrImpl” opName=“ssdRoleSets”
67ssdReadfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.ReviewMgrImpl” opName=“ssdRoleSet”
68ssdRolesfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.ReviewMgrImpl” opName=“ssdRoleSetRoles”
69ssdCardfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.ReviewMgrImpl” opName=“ssdRoleSetCardinality”
70dsdRoleSetsfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.ReviewMgrImpl” opName=“dsdRoleSets”
71dsdSetsfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.ReviewMgrImpl” opName=“ssdSets”
72dsdReadfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.ReviewMgrImpl” opName=“dsdRoleSet”
73dsdRolesfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.ReviewMgrImpl” opName=“dsdRoleSetRoles”
74dsdCardfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.ReviewMgrImpl” opName=“dsdRoleSetCardinality”
75dsdSetsfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.ReviewMgrImpl” opName=“dsdSets”
76readPermAttributeSetfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.ReviewMgrImpl” opName=“readPermAttributeSet”
77findRoleConstraintsfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.ReviewMgrImpl” opName=“findRoleConstraints”
78arleAddfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.DelAdminMgrImpl” opName=“addRole”
79arleDeletefalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.DelAdminMgrImpl” opName=“deleteRole”
80arleUpdatefalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.DelAdminMgrImpl” opName=“updateRole”
81adminAssignfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.DelAdminMgrImpl” opName=“assignUser”
82adminDeassignfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.DelAdminMgrImpl” opName=“deassignUser”
83orgAddfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.DelAdminMgrImpl” opName=“addOU”
84orgUpdatefalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.DelAdminMgrImpl” opName=“updateOU”
85orgDeletefalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.DelAdminMgrImpl” opName=“deleteOU”
86orgDescendantfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.DelAdminMgrImpl” opName=“addDescendantOU”
87orgAscendentfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.DelAdminMgrImpl” opName=“addAscendantOU”
88orgAddinheritfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.DelAdminMgrImpl” opName=“addInheritanceOU”
89orgDelinheritfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.DelAdminMgrImpl” opName=“deleteInheritanceOU”
90arleDescendantfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.DelAdminMgrImpl” opName=“addDescendantRole”
91arleAscendentfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.DelAdminMgrImpl” opName=“addAscendantRole”
92arleAddinheritfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.DelAdminMgrImpl” opName=“addInheritanceRole”
93arleDelinheritfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.DelAdminMgrImpl” opName=“deleteInheritanceRole”
94arleReadfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.DelReviewMgrImpl” opName=“readRole”
95arleSearchfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.DelReviewMgrImpl” opName=“findRoles”
96arleAsignedfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.DelReviewMgrImpl” opName=“assignedRoles”
97userAsignedAdminfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.DelReviewMgrImpl” opName=“assignedUsers”
98orgReadfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.DelReviewMgrImpl” opName=“readOU”
99orgSearchfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.DelReviewMgrImpl” opName=“searchOU”
100groupAddfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.GroupMgrImpl” opName=“add”
101groupUpdatefalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.GroupMgrImpl” opName=“update”
102groupDeletefalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.GroupMgrImpl” opName=“delete”
103groupAsgnfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.GroupMgrImpl” opName=“assign”
104groupDeasgnfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.GroupMgrImpl” opName=“deassign”
105groupReadfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.GroupMgrImpl” opName=“read”
106roleGroupAsignedfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.GroupMgrImpl” opName=“groupRoles”
107groupAsignedfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.GroupMgrImpl” opName=“roleGroups”
108pswdAddfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.PwPolicyMgrImpl” opName=“add”
109pswdUpdatefalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.PwPolicyMgrImpl” opName=“update”
110pswdDeletefalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.PwPolicyMgrImpl” opName=“delete”
111pswdUserAddfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.PwPolicyMgrImpl” opName=“updateUserPolicy”
112pswdUserDeletefalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.PwPolicyMgrImpl” opName=“deletePasswordPolicy”
113pswdSearchfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.PwPolicyMgrImpl” opName=“search”
114pswdReadfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.PwPolicyMgrImpl” opName=“read”
115auditBindsfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.AuditMgrImpl” opName=“searchBinds”
116auditAuthzsfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.AuditMgrImpl” opName=“searchAuthZs”
117auditUserAuthzsfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.AuditMgrImpl” opName=“getUserAuthZs”
118auditSessionsfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.AuditMgrImpl” opName=“searchUserSessions”
119auditModsfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.AuditMgrImpl” opName=“searchAdminMods”
120auditInvldfalsefalsefalseobjName=“org.apache.directory.fortress.core.impl.AuditMgrImpl” opName=“searchInvalidUsers”
falsefalsefalse

END OF README