Creating Policies
This section describes steps to create policies using the CTE API. CTE supports Standard, LDT, COS, and IDT policies. Different types of policies can have different types of security and key rule requirements, as described in the sections below. Also, key uses can be different based on the types of policies they are used with. Refer to Creating Keys for details.
Click the following tabs for policy-specific details, requirements, and samples.
Creating Standard Policies
A STANDARD policy should contain security rules and/or key rules. At least one of these rules must be added to the standard policy.
The security rules define the access permissions based on the policy elements (user sets, resource set, and process sets). The key rules define what key is used for encryption and decryption of data.
In the following sample, in the security rule:
All users in the user set "Sample_User_Set1" have read/write access on the processes in the process set "Sample_Process_Set1" and resources in the resource set "Sample_Resource_Set1".
When a user of "Sample_User_Set1" performs any operation, the policy with the key "Sample_StandardPolicyKey" is applied.