Safeguard User's Guide (G06.29+, H06.08+, J06.03+)
Introduction to the Safeguard Subsystem
Safeguard User’s Guide — 422089-020
1 - 2
User Authentication
additional control over the authentication process, even though it provides the first 
line of defense against intrusion into your files and the entire system.
•
Authorization—Checking access control lists to determine whether another user 
has authority to access your disk files, subvolumes, and processes. You can 
designate the specific access authorities that another user may have to your 
objects. 
•
Auditing—Recording attempts to access your disk files, subvolumes, and 
processes. The Safeguard subsystem can record attempts to access your objects 
or to change the protection records associated with them.
User Authentication
The Safeguard subsystem, like Guardian security, authenticates users by ensuring that 
only persons who enter a valid user name and associated password can access the 
system.
When the Safeguard software is installed, it takes over the existing USERID files, 
which contain user records for each user on the system. The Safeguard software 
expands user records by adding unique security attributes to them. The security 
administrator controls user authentication by modifying these attributes. For example, 
the security administrator can use the PASSWORD-MUST-CHANGE attribute to 
require that users change their passwords every 30 days. Similarly, the security 
administrator can temporarily suspend a user ID so the user with that ID cannot access 
the system.
As a general user, you need to be aware of how the security administrator has defined 
your user authentication record. This is particularly important if you are required to 
change your password at regular intervals or if your disk files have been assigned 
some default security protection. Section 6, Obtaining User and Alias Information, 
describes how you can check your user authentication record.
Object Authorization
Disk files, subvolumes, and processes are objects. To specify Safeguard protection for 
an object, you add a protection record for that object to the Safeguard database. When 
you add an object to the Safeguard database, that object is no longer subject to 
Guardian security settings. The Safeguard software creates an authorization record 
that contains the security attributes pertaining to that object. You (or whoever owns the 
authorization record) can modify these attributes with SAFECOM commands. 
SAFECOM is the Safeguard command interpreter.
You protect an object by defining an access control list with the ACCESS attribute. 
Access control lists specify who can access an object and what authorities they have. 
The authorities assigned to a disk file or subvolume—READ, WRITE, EXECUTE, 
PURGE, CREATE, and OWNER—indicate the functions a user can perform on that 
object.










