XYGATE Compliance PRO (XSW) Reference Manual
XYGATE
®
Compliance PRO
™
Reference Manual
Chapter 11. Access Analysis Mapping
XYPRO Technology Corporation 189 Proprietary and Confidential
All available userids, aliases, and (XOS) ACLGROUPs on a system are shown in the
drop-down list. The list shows both the user name and user number. The userids are
displayed in order by group name and user name. Aliases appear last.
Subvols by User Query
Entering a specific (no wildcarding) userid, alias, or ACLGROUP, will return the set of
subvolumes that the selected user, alias, or ACLGROUP members may have access
to. There will be a row per subvol, per ACL_NAME. The Subvols by User greatly
reduces the number of rows that are returned to the grid or report.
All available userids, aliases, and (XOS) ACLGROUPs on a system are shown in the
drop-down list. The list shows both the user name and user number. The userids are
displayed in order by group name and user name. Aliases appear last.
Note: Only the subvolumes related to files protected by XOS are included in the listing.
Access to Files Query
Entering an exact or wild-carded $<vol>.<subvol>.<filename> mask will return the set
of users who have access to each file that matches the mask. There will be a row per
ACL user, per file that matches the file mask you enter.
Note: Depending upon the wildcarding, the resultant fileset may be very large and very
time-consuming. We strongly suggest not using $*.*.*.
ACL Masks Query
The ACL Masks query returns a list of all the masks used in the OSACL file. There will
be a line ACL_Name, per mask. If the ACL-Name entry is an ACLGROUP, there will
be a row for each userid and/or alias in the ACLGROUP. Likewise, the UNDERLYING
and NETUNDERLYING entries will generate a row for each alias with the indicated
underlying ID(s).
ACLGROUPS Query
The ACLGROUPS query returns a list of all the ACLGROUPs in the OSACL file. There
will be a line per ACL entry. If the ACL entry is an ACLGROUP, there will be a row for
each userid and/or alias in the ACLGROUP. Likewise, the UNDERLYING and
NETUNDERLYING entries will generate a row for each alias with the indicated
underlying ID. Refer to section 11.4.1, “How User-Related Entries are Expanded in
XOS Queries” on page 187.
The ACL_Types are:
A
A specified or expanded Alias. An expanded alias is the result of the UNDERLYING,
NETUNDERLYING keywords or a wild-carded ALIAS entry such as ALIAS:"sup-*"
U
A specified or expanded userid. An expanded userid is the result of a wildcarding
userids such as SUPER.*.