XYGATE Compliance PRO (XSW) Reference Manual
XYGATE
®
 Compliance PRO
™
 Reference Manual    
Chapter 11. Access Analysis Mapping 
XYPRO Technology Corporation  189  Proprietary and Confidential 
All available userids, aliases, and (XOS) ACLGROUPs on a system are shown in the 
drop-down list. The list shows both the user name and user number. The userids are 
displayed in order by group name and user name. Aliases appear last. 
Subvols by User Query 
Entering a specific (no wildcarding) userid, alias, or ACLGROUP, will return the set of 
subvolumes that the selected user, alias, or ACLGROUP members may have access 
to. There will be a row per subvol, per ACL_NAME. The Subvols by User greatly 
reduces the number of rows that are returned to the grid or report. 
All available userids, aliases, and (XOS) ACLGROUPs on a system are shown in the 
drop-down list. The list shows both the user name and user number. The userids are 
displayed in order by group name and user name. Aliases appear last. 
Note: Only the subvolumes related to files protected by XOS are included in the listing. 
Access to Files Query 
Entering an exact or wild-carded $<vol>.<subvol>.<filename> mask will return the set 
of users who have access to each file that matches the mask. There will be a row per 
ACL user, per file that matches the file mask you enter. 
Note: Depending upon the wildcarding, the resultant fileset may be very large and very 
time-consuming. We strongly suggest not using $*.*.*. 
ACL Masks Query 
The ACL Masks query returns a list of all the masks used in the OSACL file. There will 
be a line ACL_Name, per mask. If the ACL-Name entry is an ACLGROUP, there will 
be a row for each userid and/or alias in the ACLGROUP. Likewise, the UNDERLYING 
and NETUNDERLYING entries will generate a row for each alias with the indicated 
underlying ID(s). 
ACLGROUPS Query 
The ACLGROUPS query returns a list of all the ACLGROUPs in the OSACL file. There 
will be a line per ACL entry. If the ACL entry is an ACLGROUP, there will be a row for 
each userid and/or alias in the ACLGROUP. Likewise, the UNDERLYING and 
NETUNDERLYING entries will generate a row for each alias with the indicated 
underlying ID. Refer to section 11.4.1, “How User-Related Entries are Expanded in 
XOS Queries” on page 187. 
The ACL_Types are: 
A 
A specified or expanded Alias. An expanded alias is the result of the UNDERLYING, 
NETUNDERLYING keywords or a wild-carded ALIAS entry such as ALIAS:"sup-*" 
U 
A specified or expanded userid. An expanded userid is the result of a wildcarding 
userids such as SUPER.*. 










