Safeguard Administrator's Manual (G06.24+, H06.03+)
Table Of Contents
- What’s New in This Manual
- About This Manual
- 1 Introduction
- 2 Controlling User Access
- Introduction
- Using SAFECOM to Establish a Local User Community
- Using SAFECOM to Manage User Access to Your System
- Changing the Owner of a User Authentication Record
- Granting a User Temporary Access to Your System
- Requiring Users to Change Their Passwords
- Granting a Grace Period for Changing an Expired Password
- Forcing Immediate Expiration of a User’s Password
- Freezing a User's Ability to Access the System
- Specifying Auditing for a User ID
- Deleting Users
- Deleting Administrative Groups
- Using SAFECOM to Establish a Network of Users
- Using Safeguard With Nodes With Standard Security
- Identifying Network Users
- Granting a Network User Access to Objects on Your System
- Establishing a Community of Network Users
- Changes to the PAID During a User’s Session
- Additional Considerations for Aliases and Groups
- Additional Considerations for ACCESS with Network Specific Subject IDs
- Establishing Default Protection for a User's Disk Files
- Specifying a Default Command Interpreter for a User
- Establishing Guardian Defaults
- Assigning an Alias to a User
- 3 Managing User Groups
- 4 Securing Volumes and Devices
- 5 OBJECTTYPE Control
- 6 Managing Security Groups
- 7 Securing Terminals
- 8 Warning Mode
- 9 Configuration
- Safeguard Attributes
- Configuring User Authentication
- Configuring Password Control
- Configuring Device Control
- Configuring Process Control
- Configuring Disk-File Control
- Configuring Safeguard Auditing
- Configuring a Default Command Interpreter
- Configuring Communication With $CMON
- Configuring Logon Dialog
- Configuring Exclusive Access at Safeguard Terminals
- Configuring Warning Mode
- Configuring Persistence
- Configuring Attributes for Node Specific Subjects in ACLs
- 10 Installation and Management
- Safeguard Components
- Process Considerations for the SMP and SAFECOM
- Safeguard Subsystem Management Commands
- General Installation Procedure
- Installing the Safeguard Software
- Starting the SMP
- Converting to the Safeguard Subsystem
- Updating the Safeguard Software
- Guidelines for Securing the Safeguard Subsystem
- Monitoring the Safeguard Subsystem
- A SAFECOM Command Syntax
- Index

Safeguard Administrator’s Manual—523317-013
7-1
7 Securing Terminals
This section explains how to add a terminal definition to the Safeguard database so
that the Safeguard software controls that terminal. When a terminal definition is added,
the Safeguard software can perform the following additional security functions at the
terminal:
•
Start a specific command interpreter automatically after the user is authenticated
•
Allow the user who is logged on at the terminal to have exclusive access to it
Terminal definitions can be added selectively for some or all the terminals on your
system. The Safeguard user authentication controls are enforced regardless of
whether or not the terminal is controlled by the Safeguard software.
Use the TERMINAL security commands to add and manage terminal definition
records. Except for the INFO TERMINAL command, use of the TERMINAL commands
is restricted to security group members. INFO TERMINAL can be executed by any
user. Table 7-1 lists the security groups and shows which TERMINAL commands can
be executed by group members. If you have not defined the SECURITY-
ADMINISTRATOR and SYSTEM-OPERATOR groups, any super-group member can
use the TERMINAL commands. (For more information about how to define security
groups, see Section 6, Managing Security Groups.)
Unlike SAFECOM commands for other objects, the TERMINAL commands do not
allow you to specify an access control list. If you want to specify an access control list
for a terminal, you must do so with DEVICE or SUBDEVICE commands, depending on
how terminals are named on your system.
Terminals controlled by the Safeguard software can be configured for exclusive
access. This feature ensures that any user who is logged on at a Safeguard terminal is
given exclusive access to that terminal until the user logs off. All other users are denied
access to the terminal during the authenticated user’s session. For more information
on the TERMINAL-EXCLUSIVE-ACCESS attribute, see Configuring Exclusive Access
at Safeguard Terminals on page 9-21.
Table 7-2 on page 7-2 summarizes the TERMINAL commands.
Table 7-1. Security Groups and TERMINAL Commands
Command
SECURITY-
ADMINISTRATOR
SYSTEM-
OPERATOR
ADD TERMINAL Yes No
ALTER TERMINAL Yes No
DELETE TERMINAL Yes No
FREEZE TERMINAL Yes Yes
INFO TERMINAL Yes Yes
THAW TERMINAL Yes Yes