Safeguard Reference Manual (G06.24+, H06.03+ )

User Alias Security Commands
Safeguard Reference Manual520618-013
6-3
Aliases and Access Control Lists
Aliases and Access Control Lists
An alias name cannot appear on a Safeguard access control list. However, the
Safeguard software still rules on access attempts by a user who is logged on with an
alias name. When making access decisions for a user logged on as an alias, the
Safeguard software checks access control lists for the users underlying user ID. For
example, if user 16,24 is logged on under the alias PhilM, each attempt to access a
protected object causes the Safeguard software to check that object’s access control
list to determine if user 16,24 has the proper access authority.
In addition, if the user is logged on as an alias and attempts to add objects to the
Safeguard database or attempts to manage protected objects, these actions are
treated as if they are being performed by the underlying user ID.
User Attributes Applicable to an Alias
The user attributes applicable to a user authentication record are also applicable to an
alias authentication record. For any particular attribute, the value can differ between a
users user authentication record and that user’s alias authentication records. For
example, different auditing specifications can be applied to the user and the alias, or
different owners can be specified for the alias and user protection records.
THAW ALIAS Primary and secondary record owners, primary owner’s group
manager, and super ID
DELETE ALIAS Primary and secondary record owners, primary owner’s group
manager, and super ID
ADD ALIAS See the description at the beginning of this subsection
Table 6-1. Who Can Use the User Alias Commands (page 2 of 2)
ALIAS Command Who Can Use