Safeguard Reference Manual (G06.24+, H06.03+ )
Device and Subdevice Security Commands
Safeguard Reference Manual—520618-013
10-4
Syntax of Device and Subdevice Security
Commands
Syntax of Device and Subdevice Security 
Commands
The rest of this section contains individual syntax descriptions for the SAFECOM 
device and subdevice security commands. Commands are presented in alphabetical 
order, and most of the command descriptions contain these elements:
•
A summary of the function performed by the command, including the restrictions 
on who can use the command
•
The syntax of the command, including descriptions of the command parameters 
and variables
•
The format for the command listing or report (for commands that produce listings 
or reports)
•
Considerations for the use of the command
•
Examples of command usage
ADD DEVICE and SUBDEVICE Commands
ADD DEVICE or SUBDEVICE creates a Safeguard authorization record for one or 
more devices or subdevices. After an authorization record is created for a device or 
subdevice, all attempts to access the device or subdevice are subject to Safeguard 
authorization checks and, optionally, to Safeguard auditing.
Only a local super-group user can add an authorization record for a device or 
subdevice unless otherwise specified by the OBJECTTYPE DEVICE or SUBDEVICE 
ACL.
You can use SET DEVICE or SET SUBDEVICE to establish default attribute values 
and then use ADD DEVICE or ADD SUBDEVICE to name the devices or subdevices 
to which the default attribute values are to be applied. You can also specify values for 
SET [SUB]DEVICE Sets one or more default device or subdevice attribute values to 
specified values. When a device or subdevice authorization 
record is added, the current default device or subdevice attribute 
values are used for any attributes not specified in the ADD 
DEVICE or ADD SUBDEVICE command. 
SHOW [SUB]DEVICE Displays the current default values of the device or subdevice 
attributes. 
THAW [SUB]DEVICE For frozen devices and subdevices, restores the access 
authorities granted to users in the device or subdevice ACL.
Table 10-1. Device and Subdevice Security Command Summary (page2of2)
Command Description










