Safeguard Administrator's Manual (G06.24+, H06.03+)
Table Of Contents
- What’s New in This Manual
- About This Manual
- 1 Introduction
- 2 Controlling User Access
- Introduction
- Using SAFECOM to Establish a Local User Community
- Using SAFECOM to Manage User Access to Your System
- Changing the Owner of a User Authentication Record
- Granting a User Temporary Access to Your System
- Requiring Users to Change Their Passwords
- Granting a Grace Period for Changing an Expired Password
- Forcing Immediate Expiration of a User’s Password
- Freezing a User's Ability to Access the System
- Specifying Auditing for a User ID
- Deleting Users
- Deleting Administrative Groups
- Using SAFECOM to Establish a Network of Users
- Using Safeguard With Nodes With Standard Security
- Identifying Network Users
- Granting a Network User Access to Objects on Your System
- Establishing a Community of Network Users
- Changes to the PAID During a User’s Session
- Additional Considerations for Aliases and Groups
- Additional Considerations for ACCESS with Network Specific Subject IDs
- Establishing Default Protection for a User's Disk Files
- Specifying a Default Command Interpreter for a User
- Establishing Guardian Defaults
- Assigning an Alias to a User
- 3 Managing User Groups
- 4 Securing Volumes and Devices
- 5 OBJECTTYPE Control
- 6 Managing Security Groups
- 7 Securing Terminals
- 8 Warning Mode
- 9 Configuration
- Safeguard Attributes
- Configuring User Authentication
- Configuring Password Control
- Configuring Device Control
- Configuring Process Control
- Configuring Disk-File Control
- Configuring Safeguard Auditing
- Configuring a Default Command Interpreter
- Configuring Communication With $CMON
- Configuring Logon Dialog
- Configuring Exclusive Access at Safeguard Terminals
- Configuring Warning Mode
- Configuring Persistence
- Configuring Attributes for Node Specific Subjects in ACLs
- 10 Installation and Management
- Safeguard Components
- Process Considerations for the SMP and SAFECOM
- Safeguard Subsystem Management Commands
- General Installation Procedure
- Installing the Safeguard Software
- Starting the SMP
- Converting to the Safeguard Subsystem
- Updating the Safeguard Software
- Guidelines for Securing the Safeguard Subsystem
- Monitoring the Safeguard Subsystem
- A SAFECOM Command Syntax
- Index

Configuration
Safeguard Administrator’s Manual—523317-013
9-4
Configuring User Authentication
Configuring User Authentication
Intruders often gain access to a system by making multiple attempts to guess a user's
password. You can configure the Safeguard software to help prevent this possibility by
setting the maximum number of logon attempts for a user ID at one time, and setting a
delay or freeze if that number is exceeded.
These Safeguard attributes relate to user authentication:
AUTHENTICATE-MAXIMUM-ATTEMPTS
The maximum number of failed logon attempts for a single user ID before the
Safeguard software freezes the user ID or causes a timeout to occur. The default
value is 3.
SYSTEM-WARNING-MODE OFF
OBJECT-WARNING-MODE OFF
WARNING-FALLBACK-SECURITY GUARDIAN
ALLOW-DISKFILE-PERSISTENT NORMAL
ALLOW-NODE-ID-ACL OFF
CHECK-DISKFILE-PATTERN OFF
AUDIT-CLIENT-OSS
**
ON
PASSWORD-ALGORITHM
*
DES
PASSWORD-MAXIMUM-LENGTH
3
8
PASSWORD-COMPATIBILITY-MODE
3
ON
PASSWORD-UPPERCASE-REQUIRED
^
OFF
PASSWORD-LOWERCASE-REQUIRED
^
OFF
PASSWORD-NUMERIC-REQUIRED
^
OFF
PASSWORD-SPECIALCHAR-REQUIRED
^
OFF
PASSWORD-SPACES-ALLOWED
^
OFF
PASSWORD-MIN-QUALITY-REQUIRED
^
0
Table 9-1. Safeguard Attribute Default Values (page 3 of 3)
Attribute Name Initial or Default Value
*
For systems running G06.29 and later G-series RVUs and H06.06 and later H-series RVUs, the default value
for PASSWORD-MINIMUM-LENGTH is six and PASSWORD-ENCRYPT is TRUE.
**
Supported only on systems running G06.29 and later G-series RVUs and H06.08 and H-series RVUs.
AUDIT-CLIENT-GUARDIAN is a synonym for AUDIT-CLIENT-SERVICE.
3
Supported only on systems running H06.08 and later H-series RVUs.
^
Supported only on systems running H06.09 and later H-series RVUs.