Safeguard Administrator's Manual (G06.24+, H06.03+)
Table Of Contents
- What’s New in This Manual
- About This Manual
- 1 Introduction
- 2 Controlling User Access
- Introduction
- Using SAFECOM to Establish a Local User Community
- Using SAFECOM to Manage User Access to Your System
- Changing the Owner of a User Authentication Record
- Granting a User Temporary Access to Your System
- Requiring Users to Change Their Passwords
- Granting a Grace Period for Changing an Expired Password
- Forcing Immediate Expiration of a User’s Password
- Freezing a User's Ability to Access the System
- Specifying Auditing for a User ID
- Deleting Users
- Deleting Administrative Groups
- Using SAFECOM to Establish a Network of Users
- Using Safeguard With Nodes With Standard Security
- Identifying Network Users
- Granting a Network User Access to Objects on Your System
- Establishing a Community of Network Users
- Changes to the PAID During a User’s Session
- Additional Considerations for Aliases and Groups
- Additional Considerations for ACCESS with Network Specific Subject IDs
- Establishing Default Protection for a User's Disk Files
- Specifying a Default Command Interpreter for a User
- Establishing Guardian Defaults
- Assigning an Alias to a User
- 3 Managing User Groups
- 4 Securing Volumes and Devices
- 5 OBJECTTYPE Control
- 6 Managing Security Groups
- 7 Securing Terminals
- 8 Warning Mode
- 9 Configuration
- Safeguard Attributes
- Configuring User Authentication
- Configuring Password Control
- Configuring Device Control
- Configuring Process Control
- Configuring Disk-File Control
- Configuring Safeguard Auditing
- Configuring a Default Command Interpreter
- Configuring Communication With $CMON
- Configuring Logon Dialog
- Configuring Exclusive Access at Safeguard Terminals
- Configuring Warning Mode
- Configuring Persistence
- Configuring Attributes for Node Specific Subjects in ACLs
- 10 Installation and Management
- Safeguard Components
- Process Considerations for the SMP and SAFECOM
- Safeguard Subsystem Management Commands
- General Installation Procedure
- Installing the Safeguard Software
- Starting the SMP
- Converting to the Safeguard Subsystem
- Updating the Safeguard Software
- Guidelines for Securing the Safeguard Subsystem
- Monitoring the Safeguard Subsystem
- A SAFECOM Command Syntax
- Index

Configuration
Safeguard Administrator’s Manual—523317-013
9-22
Configuring Persistence
Configuring Persistence
Use the ADD command to configure persistence, which allows you to create protection
records for disk files. The NORMAL value of this attribute is designed to preserve
backward compatibility. The ALWAYS value provides access to the persistence feature.
This attribute relates to persistence:
ALLOW-DISKFILE-PERSISTENT
ALWAYS allows the creation of disk-file protection records for files that might not
exist. NORMAL restricts creation of disk-file protection records to files that exist.
The initial value is NORMAL.
To change any of these values, issue the ALTER SAFEGUARD command from
SAFECOM. For example, to enable disk file persistence:
=ALTER SAFE, ALLOW-DISKFILE-PERSISTENT ALWAYS
Configuring Attributes for Node Specific
Subjects in ACLs
Use the global configuration attribute ALLOW-NODE-ID-ACL to define ACL entries
containing explicit node identifiers for subjects to be consulted to determine access.
The initial ALLOW-NODE-ID-ACL value is off, ignoring ACL entries containing explicit
node identifiers.
This attribute relates to node identifiers:
ALLOW-NODE-ID-ACL
OFF ignores ACL entries containing explicit node identifiers. ON defines ACL
entries containing explicit node identifiers for subjects to be consulted to determine
access.
To change any of these values, issue the ALTER SAFEGUARD command from
SAFECOM.
Note. PROGID and LICENSE are reset for a disk file with a persistent protection record when
the file is created.