Module netapp_ontap.models.acl_delete

Copyright © 2022 NetApp Inc. All rights reserved.


class AclDeleteSchema (*, only: Union[Sequence[str], Set[str]] = None, exclude: Union[Sequence[str], Set[str]] = (), many: bool = False, context: Dict = None, load_only: Union[Sequence[str], Set[str]] = (), dump_only: Union[Sequence[str], Set[str]] = (), partial: Union[bool, Sequence[str], Set[str]] = False, unknown: str = None)

The fields of the AclDelete object


  • netapp_ontap.resource.ResourceSchema
  • marshmallow.schema.Schema
  • marshmallow.base.SchemaABC

Class variables


Specifies whether the ACL is for DACL or SACL. The available values are:

  • access_allow - DACL for allow access
  • access_deny - DACL for deny access
  • audit_success - SACL for success access
  • audit_failure - SACL for failure access

Valid choices:

  • access_allow
  • access_deny
  • audit_failure
  • audit_success
access_control GET POST PATCH

An Access Control Level specifies the access control of the task to be applied. Valid values are "file-directory" or "Storage-Level Access Guard (SLAG)". SLAG is used to apply the specified security descriptors with the task for the volume or qtree. Otherwise, the security descriptors are applied on files and directories at the specified path. The value slag is not supported on FlexGroups volumes. The default value is "file-directory".

Valid choices:

  • file_directory
  • slag

The apply_to field of the acl_delete.

ignore_paths GET POST PATCH

Specifies that permissions on this file or directory cannot be replaced.

Example: ["/dir1/dir2/","/parent/dir3"]

propagation_mode GET POST PATCH

Specifies how to propagate security settings to child subfolders and files. This setting determines how child files/folders contained within a parent folder inherit access control and audit information from the parent folder. The available values are:

  • propogate - propagate inheritable permissions to all subfolders and files
  • replace - replace existing permissions on all subfolders and files with inheritable permissions

Valid choices:

  • propagate
  • replace