Module netapp_ontap.models.acl
Copyright © 2023 NetApp Inc. All rights reserved.
This file has been automatically generated based on the ONTAP REST API documentation.
Classes
class AclSchema (*, only: Union[Sequence[str], Set[str]] = None, exclude: Union[Sequence[str], Set[str]] = (), many: bool = False, context: Dict = None, load_only: Union[Sequence[str], Set[str]] = (), dump_only: Union[Sequence[str], Set[str]] = (), partial: Union[bool, Sequence[str], Set[str]] = False, unknown: str = None)
-
The fields of the Acl object
Ancestors
- netapp_ontap.resource.ResourceSchema
- marshmallow.schema.Schema
- marshmallow.base.SchemaABC
Class variables
-
access: str GET POST PATCH
-
Specifies whether the ACL is for DACL or SACL. The available values are:
- access_allow - DACL for allow access
- access_deny - DACL for deny access
- access_allowed_callback - CALLBACK for allowed access
- access_denied_callback - CALLBACK for denied access
- access_allowed_callback_object - CALLBACK OBJECT for allowed access
- access_denied_callback_object - CALLBACK OBJECT for denied access
- system_audit_callback - SYSTEM Audit Callback ace
- system_audit_callback_object - SYSTEM Audit Callback Object ace
- system_resource_attribute - SYSTEM Resource Attribute
- system_scoped_policy_id - SYSTEM Scope Policy ID
- audit_success - SACL for success access
- audit_failure - SACL for failure access
- audit_success_and_failure - SACL for both success and failure access
Valid choices:
- access_allow
- access_deny
- access_allowed_callback
- access_denied_callback
- access_allowed_callback_object
- access_denied_callback_object
- system_audit_callback
- system_audit_callback_object
- system_resource_attribute
- system_scoped_policy_id
- audit_failure
- audit_success
- audit_success_and_failure
-
access_control: str GET
-
An Access Control Level specifies the access control of the task to be applied. Valid values are "file-directory" or "Storage-Level Access Guard (SLAG)". SLAG is used to apply the specified security descriptors with the task for the volume or qtree. Otherwise, the security descriptors are applied on files and directories at the specified path. The value SLAG is not supported on FlexGroups volumes. The default value is "file-directory" ('-' and '_' are interchangeable).
Valid choices:
- file_directory
- slag
-
advanced_rights: AdvancedRights GET POST PATCH
-
The advanced_rights field of the acl.
-
apply_to: ApplyTo GET POST PATCH
-
The apply_to field of the acl.
-
inherited: bool GET
-
Indicates whether or not the ACE flag is inherited.
Example: true
-
rights: str GET POST PATCH
-
The rights field of the acl.
-
user: str GET POST
-
Specifies the account to which the ACE applies. You can specify either name or SID.
Example: S-1-5-21-2233347455-2266964949-1780268902-69304