Safeguard Administrator's Manual (G06.24+, H06.03+)
Table Of Contents
- What’s New in This Manual
- About This Manual
- 1 Introduction
- 2 Controlling User Access
- Introduction
- Using SAFECOM to Establish a Local User Community
- Using SAFECOM to Manage User Access to Your System
- Changing the Owner of a User Authentication Record
- Granting a User Temporary Access to Your System
- Requiring Users to Change Their Passwords
- Granting a Grace Period for Changing an Expired Password
- Forcing Immediate Expiration of a User’s Password
- Freezing a User's Ability to Access the System
- Specifying Auditing for a User ID
- Deleting Users
- Deleting Administrative Groups
- Using SAFECOM to Establish a Network of Users
- Using Safeguard With Nodes With Standard Security
- Identifying Network Users
- Granting a Network User Access to Objects on Your System
- Establishing a Community of Network Users
- Changes to the PAID During a User’s Session
- Additional Considerations for Aliases and Groups
- Additional Considerations for ACCESS with Network Specific Subject IDs
- Establishing Default Protection for a User's Disk Files
- Specifying a Default Command Interpreter for a User
- Establishing Guardian Defaults
- Assigning an Alias to a User
- 3 Managing User Groups
- 4 Securing Volumes and Devices
- 5 OBJECTTYPE Control
- 6 Managing Security Groups
- 7 Securing Terminals
- 8 Warning Mode
- 9 Configuration
- Safeguard Attributes
- Configuring User Authentication
- Configuring Password Control
- Configuring Device Control
- Configuring Process Control
- Configuring Disk-File Control
- Configuring Safeguard Auditing
- Configuring a Default Command Interpreter
- Configuring Communication With $CMON
- Configuring Logon Dialog
- Configuring Exclusive Access at Safeguard Terminals
- Configuring Warning Mode
- Configuring Persistence
- Configuring Attributes for Node Specific Subjects in ACLs
- 10 Installation and Management
- Safeguard Components
- Process Considerations for the SMP and SAFECOM
- Safeguard Subsystem Management Commands
- General Installation Procedure
- Installing the Safeguard Software
- Starting the SMP
- Converting to the Safeguard Subsystem
- Updating the Safeguard Software
- Guidelines for Securing the Safeguard Subsystem
- Monitoring the Safeguard Subsystem
- A SAFECOM Command Syntax
- Index

Controlling User Access
Safeguard Administrator’s Manual—523317-013
2-27
Identifying Network Users
Identifying Network Users
You identify a user as a network user on an access control list by preceding the user ID
or user name with \*. (backslash-star-period).
The network forms for user IDs and user names are:
For example, if ADMIN.BOB (user ID 1,0) is a network user, either of these commands
gives him READ and WRITE access to the disk file QUARTER1:
=ALTER DISKFILE quarter1, ACCESS \test.admin.bob (r,w)
or
=ALTER DISKFILE quarter1, ACCESS \test.1,0 (r,w)
A user cannot use the network form of a user name to log on to the system. The
network form is used only for user identification within the Safeguard subsystem.
Table 2-3. SAFECOM and Standard Security Programs Used to Manage Network
Users
Function SAFECOM Command Standard Security Program
Add a local user ADD USER ADDUSER program
Define a remote
password for a local user
ADD USER
REMOTEPASSWORD ALTER
USER REMOTEPASSWORD
SET USER
REMOTEPASSWORD
RPASSWRD program
Change or delete a
remote password for a
local user
ALTER USER
REMOTEPASSWORD
RPASSWRD program
Delete a local user DELETE USER DELUSER program
Add a user alias ADD ALIAS Not supported
Define a remote
password for a user alias
ADD ALIAS
REMOTEPASSWORD ALTER
ALIAS REMOTEPASSWORD
SET ALIAS
REMOTEPASSWORD
RPASSWRD program
Change or delete a
remote password for a
user alias
ALTER ALIAS
REMOTEPASSWORD
RPASSWRD program
Delete a user alias DELETE ALIAS Not supported
Network user ID: \node.group number , member number
Network user name: \node.group name.member name