CIM_Privilege, ROOT\Hardware

Class | Childs (1) | Methods | Properties (8) | Qualifiers (4) | Instances (1) | Namespaces (3)
Samples: VB Script | C# | VB.Net | Search on:Microsoft

Description

Privilege is the base class for all types of activities which are granted or denied by a Role or an Identity. Whether an individual Privilege is granted or denied is defined using the PrivilegeGranted boolean. Any Privileges not specifically granted are assumed to be denied. An explicit deny (Privilege Granted = FALSE) takes precedence over any granted Privileges. The association of subjects (Roles and Identities) to Privileges is accomplished using policy or explicitly via the associations on a subclass. The entities that are protected (targets) can be similarly defined. Note that Privileges may be inherited through hierarchical Roles, or may overlap. For example, a Privilege denying any instance Writes in a particular CIM Server Namespace would overlap with a Privilege defining specific access rights at an instance level within that Namespace. In this example, the AuthorizedSubjects are either Identities or Roles, and the AuthorizedTargets are a Namespace in the former case, and a particular instance in the latter.

CIM_Privilege - child subclasses in ROOT\Hardware

Number of classes:1
Class nameChildsPropertiesMethodsClass
Instances
Child
Instances
AbstractSingleton
CIM_AuthorizedPrivilege180-1-

CIM_Privilege properties

CIM_Privilege has 8 properties (5 Local, 3 Derived)

NameOriginCIMType
ActivitiesCIM_Privilege18 [uint16]
ActivityQualifiersCIM_Privilege8 [string]
CaptionCIM_ManagedElement8 [string]
DescriptionCIM_ManagedElement8 [string]
ElementNameCIM_ManagedElement8 [string]
key
InstanceID
CIM_Privilege8 [string]
PrivilegeGrantedCIM_Privilege11 [boolean]
QualifierFormatsCIM_Privilege18 [uint16]

Detailed description of CIM_Privilege properties

Local properties (5) of CIM_Privilege class

Activities property
ArrayType'Indexed'
CIMTYPE'uint16'
Description'An enumeration indicating the activities that are granted or denied. These activities apply to all entities specified in the ActivityQualifiers array. The values in the enumeration are straightforward except for one, 4="Detect". This value indicates that the existence or presence of an entity may be determined, but not necessarily specific data (which requires the Read privilege to be true). This activity is exemplified by 'hidden files'- if you list the contents of a directory, you will not see hidden files. However, if you know a specific file name, or know how to expose hidden files, then they can be 'detected'. Another example is the ability to define search privileges in directory implementations.'
ModelCorrespondence['CIM_Privilege.ActivityQualifiers']
ValueMap['1', '2', '3', '4', '5', '6', '7', '..15999', '16000..']
Values['Other', 'Create', 'Delete', 'Detect', 'Read', 'Write', 'Execute', 'DMTF Reserved', 'Vendor Reserved']
Activities property is in 3 classes of ROOT\Hardware and in 3 namespaces
ActivityQualifiers property
ArrayType'Indexed'
CIMTYPE'string'
Description'The ActivityQualifiers property is an array of string values used to further qualify and specify the privileges granted or denied. For example, it is used to specify a set of files for which 'Read'/'Write' access is permitted or denied. Or, it defines a class' methods that may be 'Executed'. Details on the semantics of the individual entries in ActivityQualifiers are provided by corresponding entries in the QualifierFormats array.'
ModelCorrespondence['CIM_Privilege.Activities', 'CIM_Privilege.QualifierFormats']
ActivityQualifiers property is in 3 classes of ROOT\Hardware and in 3 namespaces
InstanceID property
CIMTYPE'string'
Description'Within the scope of the instantiating Namespace, InstanceID opaquely and uniquely identifies an instance of this class. In order to ensure uniqueness within the NameSpace, the value of InstanceID SHOULD be constructed using the following 'preferred' algorithm:
:
Where and are separated by a colon ':', and where MUST include a copyrighted, trademarked or otherwise unique name that is owned by the business entity creating/defining the InstanceID, or is a registered ID that is assigned to the business entity by a recognized global authority. (This is similar to the _ structure of Schema class names.) In addition, to ensure uniqueness MUST NOT contain a colon (':'). When using this algorithm, the first colon to appear in InstanceID MUST appear between and .
is chosen by the business entity and SHOULD not be re-used to identify different underlying (real-world) elements. If the above 'preferred' algorithm is not used, the defining entity MUST assure that the resultant InstanceID is not re-used across any InstanceIDs produced by this or other providers for this instance's NameSpace. For DMTF defined instances, the 'preferred' algorithm MUST be used with the set to 'CIM'.'
keyTrue
InstanceID property is in 11 classes of ROOT\Hardware and in 21 namespaces
PrivilegeGranted property
CIMTYPE'boolean'
Description'Boolean indicating whether the Privilege is granted (TRUE) or denied (FALSE). The default is to grant permission.'
PrivilegeGranted property is in 3 classes of ROOT\Hardware and in 3 namespaces
QualifierFormats property
ArrayType'Indexed'
CIMTYPE'uint16'
Description'Defines the semantics of corresponding entries in the ActivityQualifiers array. An example of each of these 'formats' and their use follows:
- 2=Class Name. Example: If the authorization target is a CIM Service or a Namespace, then the ActivityQualifiers entries can define a list of classes that the authorized subject is able to create or delete.
- 3=Property. Example: If the authorization target is a CIM Service, Namespace or Collection of instances, then the ActivityQualifiers entries can define the class properties that may or may not be accessed. In this case, the class names are specified with the property names to avoid ambiguity - since a CIM Service, Namespace or Collection could manage multiple classes. On the other hand, if the authorization target is an individual instance, then there is no possible ambiguity and the class name may be omitted. To specify ALL properties, the wildcard string "*" should be used.
- 4=Method. This example is very similar to the Property one, above. And, as above, the string "*" may be specified to select ALL methods.
- 5=Object Reference. Example: If the authorization target is a CIM Service or Namespace, then the ActivityQualifiers entries can define a list of object references (as strings) that the authorized subject can access.
- 6=Namespace. Example: If the authorization target is a CIM Service, then the ActivityQualifiers entries can define a list of Namespaces that the authorized subject is able to access.
- 7=URL. Example: An authorization target may not be defined, but a Privilege could be used to deny access to specific URLs by individual Identities or for specific Roles, such as the 'under 17' Role.
- 8=Directory/File Name. Example: If the authorization target is a FileSystem, then the ActivityQualifiers entries can define a list of directories and files whose access is protected.
- 9=Command Line Instruction. Example: If the authorization target is a ComputerSystem or Service, then the ActivityQualifiers entries can define a list of command line instructions that may or may not be 'Executed' by the authorized subjects.'
ModelCorrespondence['CIM_Privilege.ActivityQualifiers']
ValueMap['2', '3', '4', '5', '6', '7', '8', '9', '..15999', '16000..']
Values['Class Name', 'Property', 'Method', 'Object Reference', 'Namespace', 'URL', 'Directory/File Name', 'Command Line Instruction', 'DMTF Reserved', 'Vendor Reserved']
QualifierFormats property is in 3 classes of ROOT\Hardware and in 3 namespaces

Derived properties (3) of CIM_Privilege class

Caption property
CIMTYPE'string'
Description'The Caption property is a short textual description (one- line string) of the object.'
Caption property is in 33 classes of ROOT\Hardware and in 37 namespaces
Description property
CIMTYPE'string'
Description'The Description property provides a textual description of the object.'
Description property is in 34 classes of ROOT\Hardware and in 142 namespaces
ElementName property
CIMTYPE'string'
Description'A user-friendly name for the object. This property allows each instance to define a user-friendly name IN ADDITION TO its key properties/identity data, and description information.
Note that ManagedSystemElement's Name property is also defined as a user-friendly name. But, it is often subclassed to be a Key. It is not reasonable that the same property can convey both identity and a user friendly name, without inconsistencies. Where Name exists and is not a Key (such as for instances of LogicalDevice), the same information MAY be present in both the Name and ElementName properties.'
ElementName property is in 33 classes of ROOT\Hardware and in 21 namespaces

CIM_Privilege Qualifiers

NameValueToInstanceToSubclassOverridableAmendedLocal
AbstractTrue
Description'Privilege is the base class for all types of activities which are granted or denied by a Role or an Identity. Whether an individual Privilege is granted or denied is defined using the PrivilegeGranted boolean. Any Privileges not specifically granted are assumed to be denied. An explicit deny (Privilege Granted = FALSE) takes precedence over any granted Privileges.

The association of subjects (Roles and Identities) to Privileges is accomplished using policy or explicitly via the associations on a subclass. The entities that are protected (targets) can be similarly defined.

Note that Privileges may be inherited through hierarchical Roles, or may overlap. For example, a Privilege denying any instance Writes in a particular CIM Server Namespace would overlap with a Privilege defining specific access rights at an instance level within that Namespace. In this example, the AuthorizedSubjects are either Identities or Roles, and the AuthorizedTargets are a Namespace in the former case, and a particular instance in the latter.'
LOCALE1033
Version'2.8.0'

CIM_Privilege System properties

NameValueOriginCIMTypeLocalArray
__PATH'\\.\ROOT\Hardware:CIM_Privilege'___SYSTEM8
__NAMESPACE'ROOT\Hardware'___SYSTEM8
__SERVER'.'___SYSTEM8
__DERIVATION['CIM_ManagedElement']___SYSTEM8
__PROPERTY_COUNT8___SYSTEM3
__RELPATH'CIM_Privilege'___SYSTEM8
__DYNASTY'CIM_ManagedElement'___SYSTEM8
__SUPERCLASS'CIM_ManagedElement'___SYSTEM8
__CLASS'CIM_Privilege'___SYSTEM8
__GENUS1___SYSTEM3

Similar Classes to CIM_Privilege

Number of classes:3
Class nameChildsPropertiesMethodsClass
Instances
Child
Instances
AbstractSingleton
AuthorizedPrivilege0801---
CIM_AuthorizedPrivilege180-1-
PrivilegeGroup070----
comments powered by Disqus
WUtils.com