Safeguard Administrator's Manual (G06.24+, H06.03+)

Table Of Contents
Controlling User Access
Safeguard Administrator’s Manual523317-013
2-32
Changes to the PAID During a User’s Session
With these remote passwords, SALES.FRED can access objects on \SF when he is
logged on with the alias Freddie at \NY. SOFTWARE.JOE can access objects on \NY
when he is logged on with alias Freddie at \SF. However, Safeguard access control
decisions are based on the underlying user ID of the alias at the remote node. In effect,
SALES.BOB has access to objects to which SOFTWARE.JOE is normally granted
access at \SF, and vice versa.
Changes to the PAID During a Users Session
Prior to D30 Safeguard, remote validation is always based on the PAID of the process
running on behalf of the requesting user. In most instances, the PAID is the same as
the user ID of the user who initially logged on at the start of the session. Under certain
circumstances, such as when the user executes a PROGID program, the PAID is
changed so that it no longer matches the original user ID. For remote validation to be
successful in this instance, matching remote passwords must exist for the user ID
identified by the PAID.
Remote validation involving systems running D30 Safeguard functions similarly, with
one distinct exception. If the user originally logged on as an alias, and the PAID of the
process running on behalf of the alias remains unchanged, the alias name rather than
the PAID is used for remote validation. (For more information, see User Aliases.) If the
PAID has changed during the session, the user ID identified by PAID is used for
remote validation.
Additional Considerations for Aliases and Groups
D30 and later Safeguard offers features that include the support of user aliases and
file-sharing groups. When you define users for remote access, you should be aware of
certain additional considerations regarding these features.
Additional Considerations for ACCESS with Network Specific
Subject IDs
The global configuration attribute ALLOW-NODE-ID-ACL defines whether ACL entries
containing explicit node identifiers for subjects are consulted to determine access. The
initial ALLOW-NODE-ID-ACL value is off, ignoring ACL entries containing explicit node
identifiers.
User Aliases
If a user who logs on as an alias is to have remote access to another node, alias
authentication records with matching underlying user IDs and remote passwords must
be defined on both the local and remote nodes. When an alias attempts remote
access, the alias authentication record on the remote node is checked for a matching
user ID and remote password. The underlying user name of the alias requesting
access is not verified on the remote node. The same alias can have a different
underlying user names at different nodes.