Safeguard Administrator's Manual (G06.24+, H06.03+)
Table Of Contents
- What’s New in This Manual
- About This Manual
- 1 Introduction
- 2 Controlling User Access
- Introduction
- Using SAFECOM to Establish a Local User Community
- Using SAFECOM to Manage User Access to Your System
- Changing the Owner of a User Authentication Record
- Granting a User Temporary Access to Your System
- Requiring Users to Change Their Passwords
- Granting a Grace Period for Changing an Expired Password
- Forcing Immediate Expiration of a User’s Password
- Freezing a User's Ability to Access the System
- Specifying Auditing for a User ID
- Deleting Users
- Deleting Administrative Groups
- Using SAFECOM to Establish a Network of Users
- Using Safeguard With Nodes With Standard Security
- Identifying Network Users
- Granting a Network User Access to Objects on Your System
- Establishing a Community of Network Users
- Changes to the PAID During a User’s Session
- Additional Considerations for Aliases and Groups
- Additional Considerations for ACCESS with Network Specific Subject IDs
- Establishing Default Protection for a User's Disk Files
- Specifying a Default Command Interpreter for a User
- Establishing Guardian Defaults
- Assigning an Alias to a User
- 3 Managing User Groups
- 4 Securing Volumes and Devices
- 5 OBJECTTYPE Control
- 6 Managing Security Groups
- 7 Securing Terminals
- 8 Warning Mode
- 9 Configuration
- Safeguard Attributes
- Configuring User Authentication
- Configuring Password Control
- Configuring Device Control
- Configuring Process Control
- Configuring Disk-File Control
- Configuring Safeguard Auditing
- Configuring a Default Command Interpreter
- Configuring Communication With $CMON
- Configuring Logon Dialog
- Configuring Exclusive Access at Safeguard Terminals
- Configuring Warning Mode
- Configuring Persistence
- Configuring Attributes for Node Specific Subjects in ACLs
- 10 Installation and Management
- Safeguard Components
- Process Considerations for the SMP and SAFECOM
- Safeguard Subsystem Management Commands
- General Installation Procedure
- Installing the Safeguard Software
- Starting the SMP
- Converting to the Safeguard Subsystem
- Updating the Safeguard Software
- Guidelines for Securing the Safeguard Subsystem
- Monitoring the Safeguard Subsystem
- A SAFECOM Command Syntax
- Index

OBJECTTYPE Control
Safeguard Administrator’s Manual—523317-013
5-6
OBJECTTYPE Auditing
The display shows:
OBJECTTYPE Auditing
All OBJECTTYPE authorization records provide auditing attributes. These attributes
enable you to audit attempts to add individual authorization records as well as attempts
to change the OBJECTTYPE authorization record.
The OBJECTTYPE audit attributes are:
The conditions for the audit attributes can be set to:
For example, if you want to audit all successful attempts to change the authorization
record for OBJECTTYPE DEVICE, issue this command:
=ALTER OBJECTTYPE DEVICE, AUDIT-MANAGE-PASS ALL
To check the audit settings, issue the INFO command with the DETAIL option:
=INFO OBJECTTYPE DEVICE, DETAIL
LAST-MODIFIED OWNER STATUS WARNING-MODE
OBJECTTYPE OBJECTTYPE
27JAN88, 14:10 200,1 THAWED OFF
200,8 C
200,12 C
255,255 DENY C,O
AUDIT-ACCESS-PASS Successful attempts to add an individual authorization
record are audited.
AUDIT-ACCESS-FAIL Unsuccessful attempts to add an individual authorization
record are audited.
AUDIT-MANAGE-PASS Successful attempts to change the OBJECTTYPE
authorization record are audited.
AUDIT-MANAGE-FAIL Unsuccessful attempts to change the OBJECTTYPE
authorization record are audited.
ALL Local and remote attempts are audited.
LOCAL Only local attempts are audited.
REMOTE Only remote attempts are audited.
NONE No attempts are audited.