XYGATE Access Control Reference Manual

XYGATE
®
Access Control Reference Manual
Contents
XYPRO Technology Corporation viii Proprietary and Confidential
A13: EMS_CRITICAL_IF_DENIED ......................................................103
A14: HIGHPIN ..........................................................................103
A15: HOMETERM .......................................................................104
A16: IPMAP .............................................................................104
A17: MACRO_NAME ....................................................................104
A18: MONITOR .........................................................................105
A19: MONITOR_DEFINE_ALLOWED ...................................................105
A20: OBEYFILES ........................................................................106
A21: OBEY_PROMPT ...................................................................107
A22: PASSONTIMEOUT.................................................................108
A23: PASSTHRU_ABEND ...............................................................108
A24: PERUSE_OBJECT .................................................................108
A25: PRIORITY .........................................................................109
A26: REXP_ALLOWDENY ..............................................................109
A27: SERVERTIMEOUT .................................................................109
A28: SHUTDOWN_MESSAGES .........................................................110
A29: SPI_REJECT_ERROR .............................................................110
A30: SUPERSUPEROK ..................................................................110
A31: TIMEOUT ..........................................................................111
A32: TR_INSTALLATION ...............................................................111
A33: USER_SWITCH ....................................................................112
A34: X_MESSAGE_DISPLAY ............................................................119
Appendix B: The ACCONFCO File .................................................................. 121
B1: Sample ACCONFCO File.........................................................121
B2: AUDIT File Considerations .....................................................121
B3: AUDIT (Process Name) ..........................................................121
B4: AUDIT (IP Address Form) .......................................................122
B5: USER_ACL ........................................................................122
Appendix C: The ACACL File ........................................................................ 123
C1: Sample ACACL File ..............................................................123
C2: ACACL Command File Limits ...................................................136
C
3: ACACL Command Entries .......................................................138
C4: Optional ACACL Command Entry Keywords .................................146