Security Management Guide (G06.24+, H06.03+)
Concerns for the Application Programmer
Security Management Guide—522283-008
6-4
Application-Specific User IDs
Application-Specific User IDs
If you choose not to use standard user IDs, your application can use application-
specific user IDs.
Because the Guardian environment does not manage or interpret these user IDs, you
have the full flexibility to design the syntax and semantics within your application. Thus,
you can make the application’s security as simple or as powerful as you need.
However, you lose the support provided by Guardian and Safeguard tools, such as
distinct IDs on a TACL STATUS command, auditing of user actions, and so on. This
condition can make security management much more difficult.
HP PS MAIL illustrates the use of independent user IDs. Each user is assigned a
correspondent name, which typically reflects the real name of the user.
PS MAIL maintains an independent database of correspondent names and their
associated passwords. When a user first invokes PS MAIL, the user must enter their
correspondent name and associated password.
PS MAIL has its own tools to update, query, and maintain the database of
correspondent names. These tools are independent of standard Guardian tools such
as the ADDUSER and USERS utilities.
Name Selection
The Guardian environment does not restrict the syntax of the names for your
application-specific user IDs. It treats these names merely as data and attaches no
special significance to them.
Creating and Maintaining the Name Database
After you create the syntax of the names, you need to develop tools to create and
maintain a database that contains those names, along with information to be
associated with each name. For example, you need a way to authenticate the user
(such as a password). Other relevant information can also be stored in the database,
such as the hours of allowed access (if access needs to be restricted on an individual
basis), additional privileges (such as allowing a user to enter a maintenance screen or
update the name database), or administrative information (such as the user’s full name
or phone extension).
Because the name database contains sensitive information, take special care to
secure this database. Access to this database means that one user can impersonate
another with respect to the application. For example, in PS MAIL, access to the
database containing the correspondent names allows a user to read another user’s
mail or even send mail as the other user.