Safeguard Reference Manual (G06.24+, H06.03+ )
Introduction
Safeguard Reference Manual—520618-013
1-10
Components of the Safeguard Subsystem
Thus, if REMOTE is the value of AUDIT-ACCESS-PASS for a disk file, the Safeguard 
software audits any attempt that it authorizes to access the file (that is, any authorized 
OPEN requests for READ, WRITE, EXECUTE, or PURGE access) that originate from 
a remote system or are sent by a remote user.
The remote user described here is not the same as the network user (defined in 
Section 2, Common SAFECOM Language Elements). A network user is a user who 
has been added to several systems and has matching remote passwords between 
those systems. A remote user is simply a process that is not locally authenticated. The 
remote user does not necessarily have a matching password definition on the local 
system. For more information, see Network Users on page 2-17. 
Components of the Safeguard Subsystem 
The Safeguard subsystem consists of a number of processes and security database 
files. These processes cooperate to manage the contents of the security database, to 
authenticate users, and to authorize attempts to access protected objects.
The following components reside on every system where the Safeguard software has 
been installed:
•
The subject database, which contains a user-authentication record for every user 
authorized to use the system.
•
The object database, which contains an object authorization record for every disk 
file, disk volume, disk subvolume, device, process name, and OBJECTTYPE 
protected by the Safeguard facility.
•
The Security Manager Process (SMP), which runs under the process name 
$ZSMP and is responsible for managing all changes to the subject and object 
databases. The SMP also verifies that the name and password supplied by the 
user match a user name and associated password stored in the subject database. 
•
SAFECOM, which is the command interpreter that provides an interactive interface 
to the SMP.
•
The Security Monitor (SMON), which authorizes all attempts to access protected 
objects. A separate SMON process runs in every CPU in a protected system. Each 
SMON performs authorization operations for all security-related transactions in that 
CPU. The SMP ensures that all SMONs are operational. 
Who Can Use SAFECOM Commands
Only users who have EXECUTE authority for the SAFECOM program object disk file 
can run SAFECOM. By creating an access control list for the SAFECOM object file, a 
security administrator can restrict EXECUTE authority for the SAFECOM program to a 
few users or to a single user.
The Safeguard software also limits who can execute certain SAFECOM commands. 
For example, some restrictions are placed on the ADD command, which creates a 










