Adds an access control entry (ACE) to a clearinghouse's access control set (ACS). SYNOPSIS ADD CLEARINGHOUSE clearinghouse-name ACCESS principal) [AS GROUP] [FOR] access Arguments clearinghouse-name The name of the clearinghouse to which access is being added. principal The principal for whom access is being added. You can specify a principal as a group name, a collection of principals denoted with wildcards (for example, .org.name*), or an individual name in the format, nodename.username. To specify a DNS Version 1-style principal, use the format nodename::username. The phrase as group indicates the specified principal is a group. You cannot use this phrase with wildcard principal names. access The access rights for the specified principal. Rights are read, write, delete, test, control, and none, and you can specify them as r, w, d, t, c, and non. Separate multiple rights with commas. Description This command adds an access control entry (ACE) to a clearinghouse's access control set. Access rights are defined as follows: Read The principal can look up the clearinghouse by name and read any attribute of the clearinghouse. Write The principal can change the replica type of any replica stored in the clearinghouse, create or delete replicas in the clearinghouse, alter any modifiable attribute of the clearinghouse (except the ACS). Delete The principal can delete the clearinghouse. Test The principal can check the value of any attribute of the clearinghouse. Control The principal can alter the clearinghouse's ACS and move the clearinghouse to another server. None The principal has no access rights. ACCESS RIGHTS You must have control access to the clearinghouse whose access control set (ACS) is being modified.
1 – example
The following command grants an access control group named .testgroup read, write, test, and control access to the .paris2_ ch clearinghouse. dns> add clearinghouse .paris2_ch access .testgroup - _> as group for r, w, t, c