POP commands
A protected object is accessible to a requester if the requester possesses the traverse permission on each ACL attached to container objects above the requested resource on the path towards root and including root.
Additionally, use the pdadmin command to learn which POP (if any) within the protected object space hierarchy controls access to the protected resource in question.
If a POP is directly attached to the protected object in question, this POP defines the POP policy for that object. If a POP is not directly attached to the protected object in question, the controlling POP is the nearest one that is above it in the protected object hierarchy.
- List POPs
- The following command lists all of the POPs which are defined for ISAM:
padmin> pop list- Finding POPs
- The following command enables us to learn where a particular POP is attached within the protected object space hierarchy:
pdadmin> pop find pop_name
Show POPs Examine the controlling POP with the following command to ensure that it is correct for the type of enforcement desired: pdadmin> pop show pop_name
Correct the POP definition if needed.
Parent topic: Unexpected access to resources