Safeguard Administrator's Manual (G06.24+, H06.03+)
Table Of Contents
- What’s New in This Manual
- About This Manual
- 1 Introduction
- 2 Controlling User Access
- Introduction
- Using SAFECOM to Establish a Local User Community
- Using SAFECOM to Manage User Access to Your System
- Changing the Owner of a User Authentication Record
- Granting a User Temporary Access to Your System
- Requiring Users to Change Their Passwords
- Granting a Grace Period for Changing an Expired Password
- Forcing Immediate Expiration of a User’s Password
- Freezing a User's Ability to Access the System
- Specifying Auditing for a User ID
- Deleting Users
- Deleting Administrative Groups
- Using SAFECOM to Establish a Network of Users
- Using Safeguard With Nodes With Standard Security
- Identifying Network Users
- Granting a Network User Access to Objects on Your System
- Establishing a Community of Network Users
- Changes to the PAID During a User’s Session
- Additional Considerations for Aliases and Groups
- Additional Considerations for ACCESS with Network Specific Subject IDs
- Establishing Default Protection for a User's Disk Files
- Specifying a Default Command Interpreter for a User
- Establishing Guardian Defaults
- Assigning an Alias to a User
- 3 Managing User Groups
- 4 Securing Volumes and Devices
- 5 OBJECTTYPE Control
- 6 Managing Security Groups
- 7 Securing Terminals
- 8 Warning Mode
- 9 Configuration
- Safeguard Attributes
- Configuring User Authentication
- Configuring Password Control
- Configuring Device Control
- Configuring Process Control
- Configuring Disk-File Control
- Configuring Safeguard Auditing
- Configuring a Default Command Interpreter
- Configuring Communication With $CMON
- Configuring Logon Dialog
- Configuring Exclusive Access at Safeguard Terminals
- Configuring Warning Mode
- Configuring Persistence
- Configuring Attributes for Node Specific Subjects in ACLs
- 10 Installation and Management
- Safeguard Components
- Process Considerations for the SMP and SAFECOM
- Safeguard Subsystem Management Commands
- General Installation Procedure
- Installing the Safeguard Software
- Starting the SMP
- Converting to the Safeguard Subsystem
- Updating the Safeguard Software
- Guidelines for Securing the Safeguard Subsystem
- Monitoring the Safeguard Subsystem
- A SAFECOM Command Syntax
- Index

Controlling User Access
Safeguard Administrator’s Manual—523317-013
2-2
TERMINAL Commands
•
Initial directory, initial program, and initial program type for the user in an HP
NonStop Open Systems Services (OSS) environment (INITIAL-DIRECTORY,
INITIAL-PROGRAM, and INITIAL-PROGTYPE attributes)
•
Automatic starting of a command interpreter for a user after logon at a terminal
controlled by the Safeguard software (CI-PROG attribute)
TERMINAL Commands
The TERMINAL commands, which are described in Section 7, Securing Terminals,
allow you to add terminal definitions to the Safeguard database. The TERMINAL
commands control this aspect of user authentication:
•
Automatic starting of a command interpreter for a user after logon (PROG attribute)
ALTER SAFEGUARD Command
You use the ALTER SAFEGUARD command, described in Section 9, Configuration, to
set the Safeguard configuration attributes. Many configuration attributes provide
security controls for users on a systemwide basis. For example, you can set the
minimum password length or limit the number of failed logon attempts. Other
configuration attributes become the default value for attributes not specified in a
particular user authentication record. For example, you can configure the Safeguard
software so that all attempts to log on are audited even if auditing is not specified in
individual user authentication records.
With the Safeguard configuration attributes, you specify these user access and
authentication controls:
•
Password algorithm (PASSWORD-ALGORITHM) (only on systems running G06.29
and later G-series RVUs and H06.06 and later H-series RVUs)
•
Minimum password length for all users (PASSWORD-MINIMUM-LENGTH)
•
Maximum password length for all users (PASSWORD-MAXIMUM-LENGTH) (only
on systems running H06.08 and later H-series RVUs)
•
Password compatibility mode specifies that only first eight characters of the
password will be considered during password change.
(PASSWORD-COMPATIBILITY-MODE) (only on systems running H06.08 and later
H-series RVUs)
•
Password history, to prevent reuse of passwords (PASSWORD-HISTORY)
•
Password encryption (PASSWORD-ENCRYPT)
•
Time period prior to expiration during which a password can be changed
(PASSWORD-MAY-CHANGE)