XYGATE Access Control Reference Manual

XYGATE
®
Access Control Reference Manual
Appendix B: The ACCONFCO File
XYPRO Technology Corporation 122 Proprietary and Confidential
B4: AUDIT (IP Address Form)
This keyword determines the audit file specifications when a IP address is defined.
Refer to Appendix A5:AUDIT (IP Process Name).”
B5: USER_ACL
The USER_ACL list is specified as a set of userids or aliases that are valid arguments
for the USER keyword in all of the entries in the ACACL file.
Syntax:
USER_ACL <userid list>
Example:
USER_ACL *.* NOT SUPER.SUPER ALIAS:"SUPER"
In this example, the XAC installation can never use SUPER.SUPER or the ALIAS
"SUPER" as the argument to the USER keyword in the ACACL file. Effectively, the
security administrator can never set up an ACACL Command Entry that will execute as
SUPER.SUPER.
Example:
USER_ACL BUS1.* OPER.* SUPER.BUS1
In this example, the XAC installation can use any userid in the BUS1 and OPER
groups and the userid SUPER.BUS1 as the argument to the USER keyword in the
ACACL file.