3.3

Table Of Contents
Using Group Security to Control System Access
45
3. When a user logs in at a device of a type listed in W_LOGTYPES, a message similar to
the following is sent to the console:
Apr 5 16:25:47 NRCS-A G3494: Attempted login bloyd 172.24.96.247
3.1.1.2/3.1.1.3 RH5
This message includes the device type and number, time of login, user name, IP address
of PC used, and client version number.
4. A logout message similar to the following is sent to the console when the user logs out:
Apr 5 16:23:55 NRCS-A G3495: Logout fiatala 172.24.96.247 {9}
3.1.1.2/3.1.1.3 RH5
A failed login—that is, an invalid user name or password—produces a message similar
to this:
Apr 5 16:25:47 NRCS-A G3494: Attempted login bogus 172.24.96.247
3.1.1.2/3.1.1.3 RH5
Regardless of the W_LOGTYPES value, a message is always sent to the console when a
superuser logs in or out. This message includes (n) if the user is a superuser. An
unsuccessful login by a superuser generates a message only if the device type used is
included in W_LOGTYPES.
Using login tracking in conjunction with console history and disk logging, you can keep
accurate records of who is using your system and when and where they are connecting
to it.
A listing of currently logged in users may be obtained from the console using the list s
command. See “list s” on page 144 for more information.
Using Group Security to Control System Access
Your system is designed to be used by a wide range of people. For the system to
accommodate so many diverse job roles, restrict sensitive areas of your database to
authorized users. The system’s powerful security features let you restrict access to important
directories and queues.
c
Security ensures that only authorized people can view or make changes to important
queues. It does not provide absolute privacy, because superusers can open any story
while performing normal system maintenance. Warn your staff not to store personal or
confidential material in the database.
Many security features in iNEWS involve establishing groups and assigning privileges and
restrictions to them. The iNEWS Setup and Configuration Manual gives you complete
information about using the group features in iNEWS to help you maintain system security.