Safeguard Reference Manual (G06.29+, H06.08+, J06.03+)
Table Of Contents
- Safeguard Reference Manual
- Legal Notices
- Contents
- What is New in this Manual
- Manual Information
- New and Changed Information
- Changes to the 520618-030 manual
- Changes to the 520618-029 manual
- Changes to the 520618-028 manual
- Changes to the 520618-027 manual
- Changes to the 520618-026 manual
- Changes to the 520618-025 manual
- Changes to the H06.22/J06.11 manual
- Changes to the H06.21/J06.10 Manual
- Changes to the H06.20/J06.09 Manual
- Changes to the 520618-020 Manual
- Changes to the H06.19/J06.08 Manual
- About This Manual
- 1 Introduction
- 2 Common SAFECOM Language Elements
- 3 The Command to Run SAFECOM
- 4 SAFECOM Session-Control Commands
- 5 User Security Commands
- 6 User Alias Security Commands
- 7 Group Commands
- 8 Disk-File Security Commands
- Disk-File Ownership
- Disk-File Access Authorities
- Disk-File Access Authorization
- Disk-File Security Command Summary
- Syntax of Disk-File Security Commands
- ADD DISKFILE Command
- ADD DISKFILE-PATTERN Command
- ALTER DISKFILE Command
- ALTER DISKFILE-PATTERN Command
- DELETE DISKFILE Command
- DELETE DISKFILE-PATTERN Command
- FREEZE DISKFILE Command
- FREEZE DISKFILE-PATTERN Command
- INFO DISKFILE Command
- INFO DISKFILE-PATTERN Command
- RESET DISKFILE Command
- RESET DISKFILE-PATTERN Command
- SET DISKFILE Command
- SET DISKFILE-PATTERN Command
- SHOW DISKFILE Command
- SHOW DISKFILE-PATTERN Command
- THAW DISKFILE Command
- THAW DISKFILE-PATTERN Command
- SAFECOM Saved Diskfile Pattern Commands
- ADD SAVED-DISKFILE-PATTERN Command
- ALTER SAVED-DISKFILE-PATTERN Command
- DELETE SAVED-DISKFILE-PATTERN Command
- FREEZE SAVED-DISKFILE-PATTERN Command
- INFO SAVED-DISKFILE-PATTERN Command
- RESET SAVED-DISKFILE-PATTERN Command
- SET SAVED-DISKFILE-PATTERN Command
- SHOW SAVED-DISKFILE-PATTERN Command
- THAW SAVED-DISKFILE-PATTERN Command
- 9 Disk Volume and Subvolume Security Commands
- Volume Authorization Record Ownership
- Subvolume Authorization Record Ownership
- Volume and Subvolume Access Authorities
- Volume and Subvolume Access Authorization
- Volume and Subvolume Security Command Summary
- Syntax of Disk Volume and Subvolume Security Commands
- ADD VOLUME and SUBVOLUME Commands
- ALTER VOLUME and SUBVOLUME Commands
- DELETE VOLUME and SUBVOLUME Commands
- FREEZE VOLUME and SUBVOLUME Commands
- INFO VOLUME and SUBVOLUME Commands
- RESET VOLUME and SUBVOLUME Commands
- SET VOLUME and SUBVOLUME Commands
- SHOW VOLUME and SUBVOLUME Commands
- THAW VOLUME and SUBVOLUME Commands
- 10 Device and Subdevice Security Commands
- Device and Subdevice Authorization Record Ownership
- Device and Subdevice Access Authorities
- Device and Subdevice Access Authorization
- Device and Subdevice Security Command Summary
- Syntax of Device and Subdevice Security Commands
- ADD DEVICE and SUBDEVICE Commands
- ALTER DEVICE and SUBDEVICE Commands
- DELETE DEVICE and SUBDEVICE Commands
- FREEZE DEVICE and SUBDEVICE Commands
- INFO DEVICE and SUBDEVICE Commands
- RESET DEVICE and SUBDEVICE Commands
- SET DEVICE and SUBDEVICE Commands
- SHOW DEVICE and SUBDEVICE Commands
- THAW DEVICE and SUBDEVICE Commands
- 11 Process and Subprocess Security Commands
- Process and Subprocess Security
- Process and Subprocess Access Authorities
- Special NAMED and UNNAMED Process Protection Records
- Process and Subprocess Security Command Summary
- Syntax of the Process and Subprocess Security Commands
- ADD PROCESS and SUBPROCESS Commands
- ALTER PROCESS and SUBPROCESS Commands
- DELETE PROCESS and SUBPROCESS Commands
- FREEZE PROCESS and SUBPROCESS Commands
- INFO PROCESS and SUBPROCESS Commands
- RESET PROCESS and SUBPROCESS Commands
- SET PROCESS and SUBPROCESS Commands
- SHOW PROCESS and SUBPROCESS Commands
- THAW PROCESS and SUBPROCESS Commands
- 12 OBJECTTYPE Security Commands
- 13 Security Group Commands
- 14 Terminal Security Commands
- 15 Event-Exit-Process Commands
- 16 Safeguard Subsystem Commands
- 17 Running Other Programs From SAFECOM
- A SAFECOM Error and Warning Messages
- B Disk-File Access Rules
- Index

User Alias Security Commands
Safeguard Reference Manual — 520618-030
6 - 2
Who Can Manage User Aliases
An alias authentication record can have multiple owners. The OWNER attribute in an
alias authentication record designates the record’s primary owner. The OWNER-LIST
attribute optionally designates one or more secondary owners. By default, the OWNER
attribute contains the user ID of the user who first created the alias authentication
record. The OWNER and OWNER-LIST attributes can be changed with a SET ALIAS
command before the record is created, or they can be changed with an ALTER ALIAS
command after the record is created. These record owners can change the security
attributes in the alias authentication record and therefore control the ability of the alias
to log on to the system.
Only the primary and secondary record owners of the alias record, the primary owner’s
group manager, and the super ID can change an alias authentication record, suspend
and restore the ability of the alias to log on to the system, and delete the alias (ALTER
ALIAS, FREEZE ALIAS, THAW ALIAS, and DELETE ALIAS commands, respectively).
The original primary owner and the secondary owners of an alias authentication record
can change the OWNER attribute to the user ID of any other user. That other user then
has control of the ability of the alias to access the system. At any time, the new primary
owner (or the secondary owners or the primary owner’s group manager or the super
ID) can transfer ownership to yet another user.
The ability to display the security attributes of an alias through the INFO ALIAS
command is restricted to these users:
•
The user who was assigned the alias
•
The primary and secondary owners of the alias authentication record
•
The group manager of the primary owner of the alias authentication record
•
The super ID
Any alias of the user can exec
ute the INFO USER command for any other alias of the
user.
Table 6-1 shows who can use the user alias commands to display, add, modify, or
delete an alias authentication record.
Note. If SUPER.SUPER is declared undeniable, any access denial by Safeguard ACLs
is ignored. This applies to both aliases of SUPER.SUPER and the SUPER.SUPER
user because all the checks are performed only on the User ID.
Table 6-1. Who Can Use the User Alias Commands (page 1 of 2)
ALIAS Command Who Can Use
SET ALIAS LIKE Any user, primary and secondary record owners, primary owner’s
group manag
er, and super ID
INFO ALIAS User assigned the alias, primary and secondary record owners,
primary owne
r’s group manager, and super ID
ALTER ALIAS Primary and secondary record owners, primary owner’s group
mana
ger, and super ID