Safeguard Administrator's Manual (G06.24+, H06.03+)
Table Of Contents
- What’s New in This Manual
- About This Manual
- 1 Introduction
- 2 Controlling User Access
- Introduction
- Using SAFECOM to Establish a Local User Community
- Using SAFECOM to Manage User Access to Your System
- Changing the Owner of a User Authentication Record
- Granting a User Temporary Access to Your System
- Requiring Users to Change Their Passwords
- Granting a Grace Period for Changing an Expired Password
- Forcing Immediate Expiration of a User’s Password
- Freezing a User's Ability to Access the System
- Specifying Auditing for a User ID
- Deleting Users
- Deleting Administrative Groups
- Using SAFECOM to Establish a Network of Users
- Using Safeguard With Nodes With Standard Security
- Identifying Network Users
- Granting a Network User Access to Objects on Your System
- Establishing a Community of Network Users
- Changes to the PAID During a User’s Session
- Additional Considerations for Aliases and Groups
- Additional Considerations for ACCESS with Network Specific Subject IDs
- Establishing Default Protection for a User's Disk Files
- Specifying a Default Command Interpreter for a User
- Establishing Guardian Defaults
- Assigning an Alias to a User
- 3 Managing User Groups
- 4 Securing Volumes and Devices
- 5 OBJECTTYPE Control
- 6 Managing Security Groups
- 7 Securing Terminals
- 8 Warning Mode
- 9 Configuration
- Safeguard Attributes
- Configuring User Authentication
- Configuring Password Control
- Configuring Device Control
- Configuring Process Control
- Configuring Disk-File Control
- Configuring Safeguard Auditing
- Configuring a Default Command Interpreter
- Configuring Communication With $CMON
- Configuring Logon Dialog
- Configuring Exclusive Access at Safeguard Terminals
- Configuring Warning Mode
- Configuring Persistence
- Configuring Attributes for Node Specific Subjects in ACLs
- 10 Installation and Management
- Safeguard Components
- Process Considerations for the SMP and SAFECOM
- Safeguard Subsystem Management Commands
- General Installation Procedure
- Installing the Safeguard Software
- Starting the SMP
- Converting to the Safeguard Subsystem
- Updating the Safeguard Software
- Guidelines for Securing the Safeguard Subsystem
- Monitoring the Safeguard Subsystem
- A SAFECOM Command Syntax
- Index

Securing Volumes and Devices
Safeguard Administrator’s Manual—523317-013
4-3
Considerations for Volumes
Considerations for Volumes
By default, only super-group users (255,*) can add a disk volume to the Safeguard
database and specify the access authorities for the volume. If necessary, you can
transfer ownership to a general user if that individual is to be responsible for protection
of the volume.
A disk volume is usually added to the Safeguard database to control who can create
files on that volume. By default, anyone can add a subvolume to the Safeguard
database.
The valid access authorities for a volume are:
For example, this command adds an authorization record for the volume $DATA, gives
CREATE authority to all members of group number 24, and gives ownership of the
VOLUME authorization record to user 24,9:
=ADD VOLUME $data, OWNER 24,9, ACCESS 24,* C
The Safeguard software always checks volumes for CREATE authority, but it must be
configured to check for the other access authorities at the volume and subvolume
levels. For more information about configuration, see Configuring Disk-File Control on
page 9-11.
Diskfile-pattern authorization records can indirectly secure volumes. Diskfile-patterns
that use wild cards in the subvolume and filename elements may be used to determine
the entire volume access depending on the CHECK-DISKFILE-PATTERN setting. For
example, this command adds an diskfile-pattern authorization record that restricts all
diskfile access to volume $DATA to group 24 for READ only:
=ADD DISKFILE-PATTERN $data.*.* ACCESS 24,* R
READ The authority to read disk files on a Safeguard-protected volume
WRITE The authority to write to disk files on a Safeguard-protected volume
EXECUTE The authority to execute program files on a Safeguard-protected
volume
PURGE The authority to purge disk files on a Safeguard-protected volume
CREATE The authority to create disk files on a Safeguard-protected volume
OWNER The authority to change the authorization record for a Safeguard-
protected volume