Security Management Guide (G06.29+, H06.08+, J06.03+)

Security Management Guide 522283-021
Index - 1
Index
A
Access authorities, Guardian 7-10
Access control lists
example of 7-15
using 3-12
using DENY with 3-12
ACL Inheritance 4-6
ACL Notation 4-4
ACL Uniqueness 4-6
ACL-REQUIRED-DISKFILE attribute 3-21
ADD GROUP command 3-11
ADD TERMINAL command 3-10
ADD USER command 3-7
Adding users
authority for 3-3
description of 3-7
ADDUSER program, removing 3-2
Administrative groups
and file-sharing groups 3-11
defined 7-7
displaying members 7-7
managing 6-1
Aliases 3-11, 6-4
Answer-back string 6-16
Application programs
controlling by super ID 2-23
restricting with Safeguard 5-3
verifying control of 8-1
Atalla A-5000 HPSM 7-16
Audit files, access to 7-15
Audit pools 3-20
Audit recovery actions 3-20
Audit service
managing
3-20
specifying audit pools 3-20
specifying recovery actions 3-20
specifying security groups 3-20
Auditing
attempts to manage Safeguard
records 3-19
file access 7-15
logon attempts 3-18
managing the audit service 3-20
object access attempts 3-19
AUTHENTICATE-FAIL-FREEZE 3-8, 3-9
AUTHENTICATE-FAIL-TIMEOUT 3-8
AUTHENTICATE-MAXIMUM-
ATTEMPTS 3-8, 3-9
Authenticating users
for application programs 5-1
with standard user IDs 5-1
without standard user IDs 5-4
Automatic logoff
for idle terminals 2-11
through TACLCSTM file 5-2
B
Backups
controlling with Safeguard 3-6
with PROGID program 2-22, 2-29
Base ACL Entries 4-5
Blind logon 2-11, 3-10, 7-2
Blind password changes 2-11
C
CALLABLE attribute 2-26
Call-back systems 6-15, 8-3
CHECK VOLUME attribute 3-6
chgrp command 4-2, 4-6, 7-21
chmod command 4-6, 7-21
chown command 4-7
CIIN file 2-22
Class Entries 4-5
CLEARONPURGE
for sensitive files
8-5
setting with ALTER DISKFILE 3-17