Safeguard Reference Manual (G06.29+, H06.08+, J06.03+)

Table Of Contents
User Security Commands
Safeguard Reference Manual 520618-030
5 - 3
User Security Command Summary
User Security Command Summary
Table 5-2 summarizes each of the user security commands.
ADD USER If no ACL exists for OBJECTTYPE USER, the local group manager
can add a member of an existing group. The local super ID can add
members of a group or add a group manager.
If an ACL exists for OBJECTTYPE USER, only members listed in
that
ACL can add users. (Thereafter, the owner can manage the
user record).
For a description of the OBJECTTYPE command, see Section
12,
OBJECTTYPE Security Commands.
Note.
The USER Command, INFO GROUP, is supported only on systems running H06.09 and
later H-series RVUs.
Table 5-2. User Security Command Summary
Command Function
ADD USER Adds a user to the system and creates an authentication record for
tha
t user with the user attribute values specified in the command. For
any unspecified attributes, the current default values are used. (To
set default attribute values, use the SET USER command.) After
being added, a user can log on to the system.
ALTER USER Changes the value of one or more user attributes in a user
aut
hentication record.
DELETE USER Deletes a user from the system (and deletes the user’s authentication
record). T
he user cannot log on to the system.
FREEZE USER Temporarily suspends a user’s ability to log on to a system. (The
THA
W USER command restores a user’s ability to log on.)
INFO USER Displays the existing attribute values defined for
a user in the user’s
authentication record.
RESET USER Sets one or more current default user attribute values to predefined
values.
SET USER Sets one or more default user attribute values to specified values.
Whe
n a user is added, the current default attributes are used for any
attribute not specified in the ADD USER command.
SHOW USER Displays the current default values of the user attributes.
THAW USER
For frozen users, restores their ability to log on to the system.
Table 5-1. Who Can Use the User Security Commands (page 2 of 2)
USER Command Who Can Use