SeeView Server Gateway (SSG) Manual
SSG Commands
HP NonStop SeeView Server Gateway (SSG) Manual—526356-004
4-14
Considerations
GROUP
causes the SSG to perform group level authentication. In this case, only users
whose user group matches the user group of the SSG are allowed to access the
CI. For example, if an SSG is running under the user ID OPS.ADMIN, only users
who are members of the OPS group are permitted to access a CI defined with
GROUP security.
USER
causes the SSG to perform user-level authentication. In this case, only users
whose ID exactly matches the ID of the SSG are allowed to access the CI. For
example, if an SSG is running under the user ID OPS.ADMIN, only the
OPS.ADMIN user is permitted to access a CI defined with USER security.
SUPER
indicates that only members of the SUPER group are allowed to access the CI,
regardless of the ID under which the SSG is running.
NONE
indicates that no users are allowed to access the CI.
CLEAR
either clears a command interpreter from the list of command interpreters or else
clears the DEFAULT setting to factory settings if DEFAULT was specified.
Considerations
•
The SET SECURE command does not dynamically update the access rule set in
use by any existing SSG processes. It alters only the SSGCOM internal settings,
which are used whenever a new SSG process is started. To change the access
rules for a running SSG, use the SECURE command.
•
The factory settings for SSGCOM permit ANY user to access the ASAP, NSS,
EMSA, and OMFCOM CIs. The DEFAULT security attribute is USER. In SSGCOM
syntax, the built-in SSGCOM settings are:
SET SECURE DEFAULT USER
SET SECURE ASAP ANY
SET SECURE NSS ANY
SET SECURE EMSA ANY
SET SECURE OMFCOM ANY
•
To display the currently defined SET SECURE values, enter the SET or SHOW
command without any additional parameters.
•
If SECURERESTRICT is ON, only SUPER group users can alter CI access rights.