次の方法で共有


3.1.1.10 Access for Public Abstract Data Model Elements

As described in section 3.1.1, direct access (query or set) of data elements tagged as "(Public)" MUST use the same authorization policies, enforced as if the elements were being accessed via the RPC-based protocol methods in this document. The calling patterns described in section 1.3 provide an overview for understanding the basic flow of the query and set patterns. Section 3.1.1.10.1 provides detailed examples for the Policy Object Data Model (section 3.1.1.1); the other object types use similar patterns.

The following table describes the level of access that MUST be enforced during direct access of the described public ADM elements.

Object type

DesiredAccess required for Query pattern

DesiredAccess required for Set pattern

Policy (section 3.1.1.1)

POLICY_VIEW_AUDIT_INFORMATION | POLICY_GET_PRIVATE_INFORMATION | POLICY_VIEW_LOCAL_INFORMATION | READ_CONTROL

POLICY_TRUST_ADMIN | POLICY_CREATE_ACCOUNT | POLICY_CREATE_SECRET | POLICY_CREATE_PRIVILEGE | POLICY_SET_DEFAULT_QUOTA_LIMITS | POLICY_SET_AUDIT_REQUIREMENTS | POLICY_AUDIT_LOG_ADMIN | POLICY_SERVER_ADMIN | READ_CONTROL

Account  (section 3.1.1.3)

ACCOUNT_VIEW | READ_CONTROL

ACCOUNT_ADJUST_PRIVILEGES | ACCOUNT_ADJUST_QUOTAS | ACCOUNT_ADJUST_SYSTEM_ACCESS | READ_CONTROL

Secret (section 3.1.1.4)

SECRET_QUERY_VALUE | READ_CONTROL

SECRET_SET_VALUE | READ_CONTROL

TrustedDomain (section 3.1.1.5)

TRUSTED_QUERY_DOMAIN_NAME | READ_CONTROL

TRUSTED_SET_CONTROLLERS | TRUSTED_SET_POSIX | READ_CONTROL