Safeguard Administrator's Manual (G06.24+, H06.03+)
Table Of Contents
- What’s New in This Manual
- About This Manual
- 1 Introduction
- 2 Controlling User Access
- Introduction
- Using SAFECOM to Establish a Local User Community
- Using SAFECOM to Manage User Access to Your System
- Changing the Owner of a User Authentication Record
- Granting a User Temporary Access to Your System
- Requiring Users to Change Their Passwords
- Granting a Grace Period for Changing an Expired Password
- Forcing Immediate Expiration of a User’s Password
- Freezing a User's Ability to Access the System
- Specifying Auditing for a User ID
- Deleting Users
- Deleting Administrative Groups
- Using SAFECOM to Establish a Network of Users
- Using Safeguard With Nodes With Standard Security
- Identifying Network Users
- Granting a Network User Access to Objects on Your System
- Establishing a Community of Network Users
- Changes to the PAID During a User’s Session
- Additional Considerations for Aliases and Groups
- Additional Considerations for ACCESS with Network Specific Subject IDs
- Establishing Default Protection for a User's Disk Files
- Specifying a Default Command Interpreter for a User
- Establishing Guardian Defaults
- Assigning an Alias to a User
- 3 Managing User Groups
- 4 Securing Volumes and Devices
- 5 OBJECTTYPE Control
- 6 Managing Security Groups
- 7 Securing Terminals
- 8 Warning Mode
- 9 Configuration
- Safeguard Attributes
- Configuring User Authentication
- Configuring Password Control
- Configuring Device Control
- Configuring Process Control
- Configuring Disk-File Control
- Configuring Safeguard Auditing
- Configuring a Default Command Interpreter
- Configuring Communication With $CMON
- Configuring Logon Dialog
- Configuring Exclusive Access at Safeguard Terminals
- Configuring Warning Mode
- Configuring Persistence
- Configuring Attributes for Node Specific Subjects in ACLs
- 10 Installation and Management
- Safeguard Components
- Process Considerations for the SMP and SAFECOM
- Safeguard Subsystem Management Commands
- General Installation Procedure
- Installing the Safeguard Software
- Starting the SMP
- Converting to the Safeguard Subsystem
- Updating the Safeguard Software
- Guidelines for Securing the Safeguard Subsystem
- Monitoring the Safeguard Subsystem
- A SAFECOM Command Syntax
- Index

Configuration
Safeguard Administrator’s Manual—523317-013
9-14
Configuring User Authentication Auditing
•
All system objects (devices, processes, and disk files) and their authorization
records
Auditing specified by configuration supplements the settings in the individual
authorization records (if the Safeguard software is configured to check the individual
record). For example, if an individual disk file record is set to audit ALL access
attempts and the Safeguard configuration is set to audit NONE of the disk file access
attempts, both local and remote access attempts are audited for the individual disk file.
Specifying both systemwide and individual auditing does not cause duplicate records
to be generated for audited events.
For more information about systemwide auditing, see the Safeguard Audit Service
Manual.
Configuring User Authentication Auditing
You can configure systemwide auditing of user authentication in addition to the audit
settings in the individual user authentication records.
These Safeguard attributes relate to user authentication auditing:
AUDIT-AUTHENTICATE-PASS
Successful user and alias logon attempts are audited. This setting supplements the
audit settings in the user or alias authentication record. The conditions can be ALL,
NONE, or LOCAL. The default is NONE.
AUDIT-AUTHENTICATE-FAIL
Unsuccessful user and alias logon attempts are audited. This setting supplements
the audit settings in the user or alias authentication record. The conditions can be
ALL, NONE, or LOCAL. If set to ALL, logon attempts with invalid user IDs are also
audited. The default is NONE.
AUDIT-SUBJECT-MANAGE-PASS
Successful attempts to create or manage a user or alias authentication record or a
group definition record are audited. This setting supplements the audit settings in
the user or alias record. The conditions can be ALL, NONE, LOCAL, or REMOTE.
The default is NONE.
AUDIT-SUBJECT-MANAGE-FAIL
Unsuccessful attempts to create or manage a user or alias authentication record or
a group definition record are audited. This setting supplements the audit settings in
the user or alias record. The conditions can be ALL, NONE, LOCAL, or REMOTE.
The default is NONE.
Note. Some of the global configuration attributes that control systemwide auditing also affect
client auditing. For details concerning these attributes, refer to the Safeguard Audit Service
Manual.