Safeguard Administrator's Manual (G06.24+, H06.03+)
Table Of Contents
- What’s New in This Manual
- About This Manual
- 1 Introduction
- 2 Controlling User Access
- Introduction
- Using SAFECOM to Establish a Local User Community
- Using SAFECOM to Manage User Access to Your System
- Changing the Owner of a User Authentication Record
- Granting a User Temporary Access to Your System
- Requiring Users to Change Their Passwords
- Granting a Grace Period for Changing an Expired Password
- Forcing Immediate Expiration of a User’s Password
- Freezing a User's Ability to Access the System
- Specifying Auditing for a User ID
- Deleting Users
- Deleting Administrative Groups
- Using SAFECOM to Establish a Network of Users
- Using Safeguard With Nodes With Standard Security
- Identifying Network Users
- Granting a Network User Access to Objects on Your System
- Establishing a Community of Network Users
- Changes to the PAID During a User’s Session
- Additional Considerations for Aliases and Groups
- Additional Considerations for ACCESS with Network Specific Subject IDs
- Establishing Default Protection for a User's Disk Files
- Specifying a Default Command Interpreter for a User
- Establishing Guardian Defaults
- Assigning an Alias to a User
- 3 Managing User Groups
- 4 Securing Volumes and Devices
- 5 OBJECTTYPE Control
- 6 Managing Security Groups
- 7 Securing Terminals
- 8 Warning Mode
- 9 Configuration
- Safeguard Attributes
- Configuring User Authentication
- Configuring Password Control
- Configuring Device Control
- Configuring Process Control
- Configuring Disk-File Control
- Configuring Safeguard Auditing
- Configuring a Default Command Interpreter
- Configuring Communication With $CMON
- Configuring Logon Dialog
- Configuring Exclusive Access at Safeguard Terminals
- Configuring Warning Mode
- Configuring Persistence
- Configuring Attributes for Node Specific Subjects in ACLs
- 10 Installation and Management
- Safeguard Components
- Process Considerations for the SMP and SAFECOM
- Safeguard Subsystem Management Commands
- General Installation Procedure
- Installing the Safeguard Software
- Starting the SMP
- Converting to the Safeguard Subsystem
- Updating the Safeguard Software
- Guidelines for Securing the Safeguard Subsystem
- Monitoring the Safeguard Subsystem
- A SAFECOM Command Syntax
- Index

Securing Volumes and Devices
Safeguard Administrator’s Manual—523317-013
4-2
General Procedure for Securing Volumes and
Devices
You can transfer ownership of a volume or device by changing the OWNER attribute.
You can also designate additional owners by specifying OWNER authority in the
access control list. Both forms of ownership allow an owner to modify the authorization
record for the volume or device.
General Procedure for Securing Volumes and
Devices
The general procedure for protecting a volume or device with the Safeguard software:
1. Establish default attributes using the SET or RESET commands.
2. Verify the default settings with the SHOW command.
3. Add the volume or device to the Safeguard database with the ADD command. This
creates an authorization record for the object.
4. Verify the attributes in the authorization record with the INFO command.
5. Make any necessary changes to the authorization record with the ALTER
command.
Table 4-2. Types of Objects and Valid Access Authorities
Type of Object Valid Access Authorities
Disk file READ WRITE EXECUTE PURGE CREATE OWNER
Diskfile-pattern READ WRITE EXECUTE PURGE CREATE OWNER
Volume READ WRITE EXECUTE PURGE CREATE OWNER
Subvolume READ WRITE EXECUTE PURGE CREATE OWNER
Device READ WRITE - - - OWNER
Subdevice READ WRITE - - - OWNER
Process READ WRITE - PURGE CREATE OWNER
Subprocess READ WRITE - - - OWNER