You can use the Jython or Jacl scripting language to remove and transfer policy sets from application artifacts. You can also remove resources that apply to a policy set attachment without deleting the policy set attachment.
Administrative role | Authorization |
---|---|
Administrator | The Administrator role must have cell-wide access to remove policy set attachments. If you have access to a specific resource only, you can remove policy set attachments for the resource for which you have access. |
Configurator | The Configurator role must have cell-wide access to remove policy set attachments. If you have access to a specific resource only, you can remove policy set attachments for the resource for which you have access. |
Deployer | The Deployer role with cell-wide or resource specific access can remove policy set attachments for application resources only. |
Operator | The Operator role cannot remove policy set attachments. |
Monitor | The Monitor role cannot remove policy set attachments. |
AdminTask.listWebServices('[–application application_name]')
To
view a list of all web services and associated applications, do not
provide the -application parameter. For each web service, the command
returns the associated application name, module name, service name,
and service type. You can also use the listAttachmentsForPolicySet
and getPolicySetAttachments administrative commands to view existing
configuration data. For additional information about these commands,
use the information center topic for the PolicySetManagement group
of commands for the AdminTask object.