XYGATE Access Control Reference Manual

XYGATE
®
Access Control Reference Manual
Contents
XYPRO Technology Corporation vi Proprietary and Confidential
Chapter 2. Configuring XAC ......................................................................... 29
2.1 Creating New Command Entries ............................................... 29
2.1.1 ACCONF ................................................................ 29
2.1.2 ACACL .................................................................. 29
2.1.3 ACACL Command Entries in the ACACL File ...................... 30
2.1.4 How to Build an ACACL Command Entry .......................... 31
2.2 How to Configure DBSO ......................................................... 31
2.3 Using XAC with the XAC Macro ................................................. 31
2.4 Using XAC without the XAC Macro ............................................. 32
2.5 Using XAC with DP (Defined Process) .......................................... 33
2.6 XAC RUN Options ................................................................. 35
2.6.1 N Option .............................................................. 35
2.6.2 A Option .............................................................. 36
2.7 Configuring XAC Userids and Aliases .......................................... 37
2.7.1 Userids ................................................................. 37
2.7.2 Aliases ................................................................. 39
2.7.3 ACLGROUPs ........................................................... 40
2.7.4 The Concept of the Current Invoking User ....................... 41
Chapter 3. Node-Conditional Processing in the ACACL File ................................... 43
3.1 Conditional Operators ........................................................... 43
3.2 Node Names or Patterns ........................................................ 45
3.3 Conditional Text ................................................................. 45
Chapter 4. DBSO The Database Server .......................................................... 49
4.1 DBSO as a Running Process ..................................................... 49
4.1.1 Naming DBSO ......................................................... 49
4.2 DBSO for Syntax and Statistics ................................................. 50
4.2.1 SYNTAX ................................................................ 50
4.2.2 STATS .................................................................. 51
4.2.3 DSTATS ................................................................ 53
4
.3 DBSO for Command Access ..................................................... 55
4.3.1 COMMANDS ............................................................ 55
Chapter 5. Command/User Access Matrix ........................................................ 57
5.1 Procedure ......................................................................... 57