Safeguard Reference Manual (G06.29+, H06.08+, J06.03+)

Table Of Contents
Introduction
Safeguard Reference Manual 520618-030
1 - 8
Event-Exit Process
terminal, you can specify that a particular command interpreter be started automatically
after user authentication at the terminal. Prior to D30, an extended logon dialog was
available only at Safeguard terminals. Effective with D30, the HP Tandem Advanced
Command Language (TACL) command interpreter also provides these extended
features as long as Safeguard is running. Section 14, Terminal Security Commands,
describes how to define terminals so that they are controlled by the Safeguard
sof
tware.
Event-Exit Process
The Safeguard software can be configured to pass authorization, authentication, and
password-change requests to a user-written process, thereby allowing that process to
participate in security policy enforcement. Section 15, Event-Exit-Process Commands,
describes how to configure an event-exit process and provides guidelines for designing
and developing such a process.
Auditing
A Safeguard record owner can define auditing for any protected object or user. Each
Safeguard record contains auditing specifications that determine which system events
are recorded in the Safeguard audit files. Each auditing specification consists of an
auditing attribute and its current defined value.
The auditing specifications are fully described in the syntax for the SET commands.
For more information, see Sections 5 through 13. You use a separate set of commands
to manage the Safeguard audit service itself. For the audit service commands, see the
Safeguard Audit Service Manual.
Object Auditing
The four auditing attributes for objects:
AUDIT-ACCESS-PASS
AUDIT-ACCESS-FAIL
AUDIT-MANAGE-PASS
AUDIT-MANAGE-FAIL
For protected objects, AUDIT-ACCESS attributes control the auditing of attempt
s to
access the object. The two AUDIT-MANAGE attributes control the auditing of attempts
to manage (change, read, or delete) the Safeguard protection record for that object.
The four possible values for each auditing attribute:
ALL
LOCAL
REMOTE
NONE