SSH Reference Manual
Similar to the Safeguard USER/ALIAS field OWNER and to base new access rules on that field. This allows an existing
local user to modify all USER records that are configured with that local user as value for new USER attribute OWNER.
The allowed actions will be the same as defined by PARTIALSSHCOMACCESSUSER/GROUP parameters. The
OWNER field for existing USER records will be assumed to be *NONE*. New USER records will be set to OWNER
*NONE* by default unless attribute OWNER is explicitly set to a different value. The owner could be identical to the
SYSTEM-USER value, could be SUPER.SUPER or the group manager of the user configured in SYSTEM-USER or
could be any other local system user.
PRINCIPAL
This attribute is used to explicitly specify which Kerberos principal(s) are authorized to logon to this user account using
“gssapi-with-mic” authentication. To define an access control list with multiple principals within a single command, the
PRINCIPAL attribute can be repeated within a single ALTER USER command.
Note: Specifying one or more Kerberos principals using this attribute will override the default Kerberos authorization
rule, which implicitly grants access to the Kerberos principal with a matching local account name.
The PRINCIPAL attribute may have the following values:
• <user>@<REALM>
A fully qualified Kerberos principal name will authorize a specific Kerberos principal to access this user
account
• *@<REALM>
This pattern will authorize any principal in the given REALM to access this user account
• *@*
This pattern will authorize any principal in any REALM (i.e. anybody with a valid service ticket) to access this
user account
Note: Specifying a wildcard pattern as principal is useful when delegating authorization to the resource started for this
user (i.e. CI-PROGRAM or SHELL-PROGRAM).
CAUTION: When specifying a wildcard PRINCIPAL, user access should be properly locked down to avoid security
breaches in which per-user authorization is bypassed (e.g. by setting SYSTEM-USER *NONE*).
The Kerberos principal name authenticated and authorized during “gssapi-with-mic” authentication will also be
displayed in the audit log and thus can be used to correlate the Kerberos principal name with the NonStop user name.
To delete a PRINCIPAL from the access control list, use the DELETE PRINCIPAL attribute.
PRIORITY
All user processes (except SFTPSERV processes) started directly by SSH2 will have the configured priority assigned.
Following are the values allowed in this parameter and their meanings:
Value Meaning
1-199 Use the given priority value
-1 Use the same priority as the SSH2 process starting the process.
Note: SFTPSERV processes will be prioritized as specified via the SFTP-PRIORITY attribute.
PTY-SERVER
The value of a specific STN PTY server, Guardian process name, which the user will use.
If a value of *DEFAULT* is specified, the user will use the STN PTY server that is configured via SSH2 parameter
PTYSERVER.
PUBLICKEY
HP NonStop SSH Reference Manual SSHCOM Command Reference • 179