Managepermissionpolicylevel : opération Stsadm (Office SharePoint Server)
Mise à jour : 2007-06-14
Operation name: Managepermissionpolicylevel
Enables an administrator to manage the policy levels for a Web application. This operation is the command-line equivalent of the process used on the Policy for Web Application page in the SharePoint Central Administration Web site.
Syntax
stsadm -o managepermissionpolicylevel
-url <URL name>
-name <permission policy level name>
[{ -add | -delete }]
[-description]
[-siteadmin]
[-siteauditor]
[-grantpermissions] <comma-separated list of permissions>
[-denypermissions] <comma-separated list of permissions>
Parameters
Parameter |
Value |
Required? |
Description |
url |
A valid URL, such as http://*server_name* |
Yes |
The URL of the Web application to which the content database is being added |
name |
A valid name, such as "Name1" |
Yes |
The name of the permission policy level |
description |
For example, Full Control, Full Read, Deny Write, Deny All, or a custom policy name that has been separately created. |
No |
Sets the description for the permission policy level. |
siteadmin |
Either one of the following values:
|
No |
Specifies whether the policy role grants site collection administrator status. Site collection administrators have Full Control over the entire site collection and can perform any action on any object. A value of "True" permits site collection administrator status. A value of "False" does not permit site collection administrator status. |
siteauditor |
Either one of the following values:
|
No |
Specifies whether the policy role grants site collection auditor status. Site collection auditors have Full Read access for the entire site collection including reading permissions and configuration data. A value of "True" permits site collection auditor status. A value of "False" does not permit site collection auditor status. |
grantpermissions |
<none> |
No |
Lists the rights that are granted through the policy role. |
denypermissions |
<none> |
No |
Lists the rights that are denied through the policy role. |