Security Management Guide (G06.24+, H06.03+)

Security Management Guide522283-008
Index-1
Index
A
Access authorities, Guardian 5-10
Access control lists
example of 5-15
using 3-12
using DENY with 3-12
ACL Inheritance 4-6
ACL Notation 4-4
ACL Uniqueness 4-6
ACL-REQUIRED-DISKFILE attribute 3-22
ADD GROUP command 3-11
ADD TERMINAL command 3-10
ADD USER command 3-7
Adding users
authority for 3-3
description of 3-7
ADDUSER program, removing 3-2
Administrative groups
and file-sharing groups 3-11
defined 5-7
displaying members 5-7
managing 7-1
Aliases 3-10, 7-4
Answer-back string 7-13
Application programs
controlling by super ID 2-21
restricting with Safeguard 6-3
verifying control of 8-1
Atalla A-5000 HPSM 5-16
Audit files, access to 5-15
Audit pools 3-21
Audit recovery actions 3-21
Audit service
managing 3-20
specifying audit pools 3-21
specifying recovery actions 3-21
specifying security groups 3-21
Auditing
attempts to manage Safeguard
records 3-20
file access 5-15
logon attempts 3-19
managing the audit service 3-20
object access attempts 3-19
AUTHENTICATE-FAIL-FREEZE 3-8, 3-9
AUTHENTICATE-FAIL-TIMEOUT 3-8
AUTHENTICATE-MAXIMUM-
ATTEMPTS 3-8, 3-9
Authenticating users
for application programs 6-1
with standard user IDs 6-1
without standard user IDs 6-4
Automatic logoff
for idle terminals 2-11
through TACLCSTM file 6-2
B
Backups
controlling with Safeguard 3-6
with PROGID program 2-20, 2-26
Base ACL Entries 4-5
Blind logon 2-11, 3-9, 5-2
Blind password changes 2-11
C
CALLABLE attribute 2-23
Call-back systems 7-12, 8-3
CHECK VOLUME attribute 3-6
chgrp command 4-2, 4-6, 5-21
chmod command 4-6, 5-21
chown command 4-6
CIIN file 2-19
Class Entries 4-5