Safeguard Administrator's Manual (G06.29+, H06.08+, J06.03+)
Controlling User Access
Safeguard Administrator’s Manual—523317-029
2-33
Changes to the PAID During a User Session
With these remote passwords, SALES.FRED can access objects on \SF when he is 
logged on with the alias Freddie at \NY. SOFTWARE.JOE can access objects on \NY 
when he is logged on with alias Freddie at \SF. However, Safeguard access control 
decisions are based on the underlying user ID of the alias at the remote node. In effect, 
SALES.BOB has access to objects to which SOFTWARE.JOE is normally granted 
access at \SF, and vice versa.
Changes to the PAID During a User Session
Prior to D30 Safeguard, remote validation is always based on the PAID of the process 
running on behalf of the requesting user. In most instances, the PAID is the same as 
the user ID of the user who initially logged on at the start of the session. Under certain 
circumstances, such as when the user executes a PROGID program, the PAID is 
changed so that it no longer matches the original user ID. For remote validation to be 
successful in this instance, matching remote passwords must exist for the user ID 
identified by the PAID.
Remote validation involving systems running D30 Safeguard functions similarly, with 
one distinct exception. If the user originally logged on as an alias, and the PAID of the 
process running on behalf of the alias remains unchanged, the alias name rather than 
the PAID is used for remote validation. (For more information, see User Aliases.) If the 
PAID has changed during the session, the user ID identified by PAID is used for 
remote validation.
Additional Considerations for Aliases and Groups
D30 and later Safeguard offers features that include the support of user aliases and 
file-sharing groups. When you define users for remote access, you should be aware of 
certain additional considerations regarding these features.
Additional Considerations for ACCESS with Network Specific 
Subject IDs
The global configuration attribute ALLOW-NODE-ID-ACL defines whether ACL entries 
containing explicit node identifiers for subjects are consulted to determine access. The 
initial ALLOW-NODE-ID-ACL value is off, ignoring ACL entries containing explicit node 
identifiers.
User Aliases
If a user who logs on as an alias is to have remote access to another node, alias 
authentication records with matching underlying user IDs and remote passwords must 
be defined on both the local and remote nodes. When an alias attempts remote 
access, the alias authentication record on the remote node is checked for a matching 
user ID and remote password. The underlying user name of the alias requesting 
access is not verified on the remote node. The same alias can have a different 
underlying user names at different nodes.










