Safeguard Administrator's Manual (G06.24+, H06.03+)
Table Of Contents
- What’s New in This Manual
- About This Manual
- 1 Introduction
- 2 Controlling User Access- Introduction
- Using SAFECOM to Establish a Local User Community
- Using SAFECOM to Manage User Access to Your System- Changing the Owner of a User Authentication Record
- Granting a User Temporary Access to Your System
- Requiring Users to Change Their Passwords
- Granting a Grace Period for Changing an Expired Password
- Forcing Immediate Expiration of a User’s Password
- Freezing a User's Ability to Access the System
- Specifying Auditing for a User ID
- Deleting Users
- Deleting Administrative Groups
 
- Using SAFECOM to Establish a Network of Users- Using Safeguard With Nodes With Standard Security
- Identifying Network Users
- Granting a Network User Access to Objects on Your System
- Establishing a Community of Network Users
- Changes to the PAID During a User’s Session
- Additional Considerations for Aliases and Groups
- Additional Considerations for ACCESS with Network Specific Subject IDs
 
- Establishing Default Protection for a User's Disk Files
- Specifying a Default Command Interpreter for a User
- Establishing Guardian Defaults
- Assigning an Alias to a User
 
- 3 Managing User Groups
- 4 Securing Volumes and Devices
- 5 OBJECTTYPE Control
- 6 Managing Security Groups
- 7 Securing Terminals
- 8 Warning Mode
- 9 Configuration- Safeguard Attributes
- Configuring User Authentication
- Configuring Password Control
- Configuring Device Control
- Configuring Process Control
- Configuring Disk-File Control
- Configuring Safeguard Auditing
- Configuring a Default Command Interpreter
- Configuring Communication With $CMON
- Configuring Logon Dialog
- Configuring Exclusive Access at Safeguard Terminals
- Configuring Warning Mode
- Configuring Persistence
- Configuring Attributes for Node Specific Subjects in ACLs
 
- 10 Installation and Management- Safeguard Components
- Process Considerations for the SMP and SAFECOM
- Safeguard Subsystem Management Commands
- General Installation Procedure
- Installing the Safeguard Software
- Starting the SMP
- Converting to the Safeguard Subsystem
- Updating the Safeguard Software
- Guidelines for Securing the Safeguard Subsystem
- Monitoring the Safeguard Subsystem
 
- A SAFECOM Command Syntax
- Index

Managing Security Groups
Safeguard Administrator’s Manual—523317-013
6-3
Adding Security Groups
Valid access authorities for groups are:
Adding Security Groups
Initially, any super-group member can add the group authorization records for the 
SECURITY-ADMINISTRATOR, SYSTEM-OPERATOR, and SECURITY-OSS-
ADMINISTRATOR security groups. Once a group authorization record is created for a 
security group, only users with EXECUTE (E) authority on the access control list can 
execute the commands restricted to that security group. Only the record owner or 
users with OWNER (O) authority on the access control list can manage the group 
authorization record.
For example, assume that, as the local super ID, you initially want to define the 
SECURITY-ADMINISTRATOR group so that it contains two members—ADMIN.SUE 
(user ID 200,5) and ADMIN.KEVIN (user ID 200,6)—who will have EXECUTE 
authority. Use this SAFECOM command:
=ADD SECURITY-GROUP SECURITY-ADMINISTRATOR, ACCESS 200,5 E; &
=200,6 E 
Use the INFO SECURITY-GROUP command to verify the results of the command:
=INFO SECURITY-GROUP SECURITY-ADMINISTRATOR
The display shows: 
Except for the super ID, ADMIN.KEVIN and ADMIN.SUE are now the only users who 
can execute the restricted commands defined for the SECURITY-ADMINISTRATOR 
security group. 
SET SECURITY-GROUP  Sets one or more group attribute values to specified 
default values.
SHOW SECURITY-GROUP  Displays the current default values of the group attributes.
THAW SECURITY-GROUP  Reenables a frozen group. Then user IDs with EXECUTE 
authority on the group access list can execute the 
restricted commands once again.
EXECUTE Execute the set of commands restricted to the group.
OWNER Manage the group authorization record.
   LAST-MODIFIED  OWNER  STATUS
GROUP SECURITY-ADMINISTRATOR
   26JAN93, 11:12  255,255 THAWED
  200,5   E
  200,6   E
Table 6-2. SECURITY-GROUP Command Summary (page 2 of 2)
Command Description










