Class CIM_X509CredentialFilterEntry
extends CIM_FilterEntryBase

An X509CredentialFilterEntry allows filtering on the attributes of an X.509 certificate. Each instance includes a value for MatchFieldName that specifies the particular X.509 attribute that is being matched.

Table of Contents
Hierarchy
Direct Known Subclasses
Class Qualifiers
Class Properties
Class Methods


Class Hierarchy

CIM_ManagedElement
   |
   +--CIM_ManagedSystemElement
   |
   +--CIM_LogicalElement
   |
   +--CIM_FilterEntryBase
   |
   +--CIM_X509CredentialFilterEntry

Direct Known Subclasses

Class Qualifiers

NameData TypeValue
DescriptionstringAn X509CredentialFilterEntry allows filtering on the attributes of an X.509 certificate. Each instance includes a value for MatchFieldName that specifies the particular X.509 attribute that is being matched.
MappingStringsstringIPSP Policy Model.IETF|CredentialFilterEntry
UMLPackagePathstringCIM::Network::Filtering
Versionstring2.8.0

Class Properties

Local Class Properties

NameData TypeDefault ValueQualifiers
NameData TypeValue
MatchFieldNameuint32
DescriptionstringMatchFieldName specifies the X.509 attribute to match against MatchFieldValue. Note that this enumeration is modified from the IETF's IPSP Policy Model to explicitly list the 'standard' X.509 attributes.
MappingStringsstringIPSP Policy Model.IETF|CredentialFilterEntry.MatchFieldName
ModelCorrespondencestringCIM_X509CredentialFilterEntry.MatchFieldValue
Requiredbooleantrue
ValueMapstring1, 2, 3, 4, 5, 6, 7, 8, 9, 10, .., 0x8000..
ValuesstringOther, Version, Serial Number, Signature Algorithm Identifier, Issuer Name, Validity Period, Subject Name, Subject Public Key Info, Key Usage, Alternate Name, DMTF Reserved, Vendor Reserved
MatchFieldValuestring
DescriptionstringMatchFieldValue specifies the value to compare with the credential attribute (defined in MatchFieldName), to determine if the credential matches this filter entry. An implementation must convert this string to a DER- encoded string before matching against the values extracted from credentials at runtime. Note that a wildcard mechanism may be used when MatchFieldName specifies a general character string (for example, if MatchFieldName=7, 'Subject Name'). MatchFieldValue may contain a wildcard character, '*', in the pattern match specification. For example, for 'Subject Name', a MatchFieldValue of 'cn=*,ou=engineering,o=foo,c=be' will successfully match a certificate whose subject attribute is 'cn=JaneDoe,ou=engineering,o=foo,c=be'. A wildcard can be used to represent 0 or more characters as would be displayed to the user (i.e., a wildcard pattern match operates on displayable character boundaries).
MappingStringsstringIPSP Policy Model.IETF|CredentialFilterEntry.MatchFieldName
ModelCorrespondencestringCIM_X509CredentialFilterEntry.MatchFieldName
Requiredbooleantrue

Inherited Properties

NameData TypeClass Origin
CaptionstringCIM_ManagedElement
CommunicationStatusuint16CIM_ManagedSystemElement
CreationClassNamestringCIM_FilterEntryBase
DescriptionstringCIM_ManagedElement
DetailedStatusuint16CIM_ManagedSystemElement
ElementNamestringCIM_ManagedElement
Generationuint64CIM_ManagedElement
HealthStateuint16CIM_ManagedSystemElement
InstallDatedatetimeCIM_ManagedSystemElement
InstanceIDstringCIM_ManagedElement
IsNegatedbooleanCIM_FilterEntryBase
NamestringCIM_FilterEntryBase
OperatingStatusuint16CIM_ManagedSystemElement
PrimaryStatusuint16CIM_ManagedSystemElement
StatusstringCIM_ManagedSystemElement
SystemCreationClassNamestringCIM_FilterEntryBase
SystemNamestringCIM_FilterEntryBase
OperationalStatusuint16[]CIM_ManagedSystemElement
StatusDescriptionsstring[]CIM_ManagedSystemElement

Class Methods