Safeguard Administrator's Manual (G06.24+, H06.03+)
Table Of Contents
- What’s New in This Manual
- About This Manual
- 1 Introduction
- 2 Controlling User Access
- Introduction
- Using SAFECOM to Establish a Local User Community
- Using SAFECOM to Manage User Access to Your System
- Changing the Owner of a User Authentication Record
- Granting a User Temporary Access to Your System
- Requiring Users to Change Their Passwords
- Granting a Grace Period for Changing an Expired Password
- Forcing Immediate Expiration of a User’s Password
- Freezing a User's Ability to Access the System
- Specifying Auditing for a User ID
- Deleting Users
- Deleting Administrative Groups
- Using SAFECOM to Establish a Network of Users
- Using Safeguard With Nodes With Standard Security
- Identifying Network Users
- Granting a Network User Access to Objects on Your System
- Establishing a Community of Network Users
- Changes to the PAID During a User’s Session
- Additional Considerations for Aliases and Groups
- Additional Considerations for ACCESS with Network Specific Subject IDs
- Establishing Default Protection for a User's Disk Files
- Specifying a Default Command Interpreter for a User
- Establishing Guardian Defaults
- Assigning an Alias to a User
- 3 Managing User Groups
- 4 Securing Volumes and Devices
- 5 OBJECTTYPE Control
- 6 Managing Security Groups
- 7 Securing Terminals
- 8 Warning Mode
- 9 Configuration
- Safeguard Attributes
- Configuring User Authentication
- Configuring Password Control
- Configuring Device Control
- Configuring Process Control
- Configuring Disk-File Control
- Configuring Safeguard Auditing
- Configuring a Default Command Interpreter
- Configuring Communication With $CMON
- Configuring Logon Dialog
- Configuring Exclusive Access at Safeguard Terminals
- Configuring Warning Mode
- Configuring Persistence
- Configuring Attributes for Node Specific Subjects in ACLs
- 10 Installation and Management
- Safeguard Components
- Process Considerations for the SMP and SAFECOM
- Safeguard Subsystem Management Commands
- General Installation Procedure
- Installing the Safeguard Software
- Starting the SMP
- Converting to the Safeguard Subsystem
- Updating the Safeguard Software
- Guidelines for Securing the Safeguard Subsystem
- Monitoring the Safeguard Subsystem
- A SAFECOM Command Syntax
- Index

Configuration
Safeguard Administrator’s Manual—523317-013
9-12
Configuring Disk-File Control
DIRECTION-DISKFILE
Determines which direction to search for access control lists if more than one of
the preceding attributes is ON. The value can be either VOLUME-FIRST or
FILENAME-FIRST. This attribute is used in conjunction with
COMBINATION-DISKFILE. (For more information, see the following note.) The
initial value is VOLUME-FIRST.
COMBINATION-DISKFILE
Determines how conflicts are resolved among volume, subvolume, and disk file
access control lists. This attribute is used in conjunction with
DIRECTION-DISKFILE (for more information, see the following note). The value
can be FIRST-ACL, FIRST-RULE, or ALL. The initial value is ALL.
ACL-REQUIRED-DISKFILE
If no access control list is found, access is denied. If this attribute is OFF, and no
Safeguard protection record is found, the Guardian security settings are used. The
initial value is OFF.
CLEARONPURGE-DISKFILE
Sets disk files to all zeros when purged. If set to OFF, the disk space is deallocated
when purged, but the data is not set to zeros. The initial value is OFF.
CHECK-DISKFILE-PATTERN
Specifies how to search diskfile patterns.
OFF
specifies that no pattern searches will occur.
FIRST
specifies that pattern searching will occur first, if and only if the result is
NORECORD then the normal search for a protection record will occur.
Note. COMBINATION-DISKFILE resolves conflicts among volume, subvolume, and disk-file
access control lists. The Safeguard software searches for an access control list in the order
determined by DIRECTION-DISKFILE. If you want to use the first access control list it finds,
specify FIRST-ACL. If you want the search to continue until it finds an access control list that
involves the user ID (either ACCESS or DENY), specify FIRST-RULE. If you want to allow
access only if specified on all access control lists, specify ALL.
Caution. If you set ACL-REQUIRED-DISKFILE ON, you must have an access control list for
the SAFECOM program file that grants execute authority to you. Otherwise, when you
complete your current session, you cannot control Safeguard through the SAFECOM
command interpreter because you cannot run SAFECOM.