Safeguard Administrator's Manual (G06.24+, H06.03+)

Table Of Contents
Introduction
Safeguard Administrator’s Manual523317-013
1-4
Who Can Run SAFECOM?
Who Can Run SAFECOM?
Decide who will use SAFECOM. Once a user runs SAFECOM, only the Safeguard
internal restrictions limit the user's capabilities. The Safeguard software imposes
internal restrictions on commands such as ADD USER, ALTER USER, and ADD
DEVICE, and most SAFECOM operations on existing protection records are restricted
to the record owner, the owner's group manager, and the local super ID. However
many SAFECOM commands are unrestricted.
If you want to limit the number of users who can use SAFECOM, you can use either
the standard security system or the Safeguard subsystem to secure the SAFECOM
program object file. Section 10, Installation and Management, describes how to use the
Safeguard subsystem to secure the SAFECOM program object file and the Safeguard
Subsystem Programmatic Interface (SPI).
Analyzing Security Needs
When you first start the SMP (Security Manager Process), all users listed in the
USERID file are automatically put under Safeguard control. The Safeguard software
offers control over additional user attributes, such as the password change
requirement and user expiration date. Decide in advance which users require
additional controls and determine what those controls will be. Section 2, Controlling
User Access, describes these additional user controls.