SeeView Server Gateway (SSG) Manual
SSG Commands
HP NonStop SeeView Server Gateway (SSG) Manual—526356-004
4-14
Considerations
GROUP
causes the SSG to perform group level authentication. In this case, only users 
whose user group matches the user group of the SSG are allowed to access the 
CI. For example, if an SSG is running under the user ID OPS.ADMIN, only users 
who are members of the OPS group are permitted to access a CI defined with 
GROUP security. 
USER
causes the SSG to perform user-level authentication. In this case, only users 
whose ID exactly matches the ID of the SSG are allowed to access the CI. For 
example, if an SSG is running under the user ID OPS.ADMIN, only the 
OPS.ADMIN user is permitted to access a CI defined with USER security. 
SUPER
indicates that only members of the SUPER group are allowed to access the CI, 
regardless of the ID under which the SSG is running. 
NONE
indicates that no users are allowed to access the CI. 
CLEAR
either clears a command interpreter from the list of command interpreters or else 
clears the DEFAULT setting to factory settings if DEFAULT was specified. 
Considerations
•
The SET SECURE command does not dynamically update the access rule set in 
use by any existing SSG processes. It alters only the SSGCOM internal settings, 
which are used whenever a new SSG process is started. To change the access 
rules for a running SSG, use the SECURE command.
•
The factory settings for SSGCOM permit ANY user to access the ASAP, NSS, 
EMSA, and OMFCOM CIs. The DEFAULT security attribute is USER. In SSGCOM 
syntax, the built-in SSGCOM settings are:
SET SECURE DEFAULT USER
SET SECURE ASAP ANY
SET SECURE NSS ANY
SET SECURE EMSA ANY
SET SECURE OMFCOM ANY
•
To display the currently defined SET SECURE values, enter the SET or SHOW 
command without any additional parameters.
•
If SECURERESTRICT is ON, only SUPER group users can alter CI access rights.










