XYGATE Compliance PRO (XSW) Reference Manual
XYGATE
®
 Compliance PRO
™
 Reference Manual    
Chapter 11. Access Analysis Mapping 
XYPRO Technology Corporation  196  Proprietary and Confidential 
11.8  XAC Access Analysis 
Access Mapping for XAC can be performed on any collection from a node that 
includes the XAC product. During the load of such a collection, the ACCONF and 
ACACL files are expanded and loaded into a database. 
Note: A node may contain more than one copy of XAC, so the copy that is chosen to 
load is by hierarchy; included in the current XTR configuration, located on 
$SYSTEM, currently active, the first configuration located otherwise. 
The XAC access queries are intended to examine your ACACL commands and to 
determine who can run what XAC Commands. 
Each output grid will include some or all of the following commands (shown in 
alphabetical order): 
Command Name  The Name of the Command.  
ACLGROUP  The name of the ACLGROUP. The individual members of any 
ACLGROUP will be expanded as described in section 11.4.1 on 
page 187. 
ACL_Name  The actual name used in the ACL: 
 Individual or wild-carded userid or alias 
 ACLGROUP 
 UNDERLYING: or NETUNDERLYING: 
 OBJECT_OWNER_GROUP.OBJECT_OWNER_USER 
 OBJECT_OWNER_GROUP.* 
ACL_No  The number sequence of the ACL_Name within the COMMAND’s 
ACL. If there are 4 entries in the ACL, the sequence numbers will 
be 1 to 4. 
ACL_Type  This column appears in the ACLGROUP output. The ACL_Type 
explains how the expanded userids were derived: 
 A = A specified or expanded Alias 
 U = A specified or expanded user 
 S = A placeholder for an expansion such as \*.*,255 or sup* 
 X = A subordinate ACLGROUP 
Alias Name  Alias name, if applicable 
AllowDeny_All_Procs   
Alias_All_Procs   
Authenticate_User   
Blank_Password   
Change_User_To  The list of IDs that this particular user can change to 
CMD  ALLOWCMD or DENYCMD (if not RE_Modifier) 
File_Type  I = input file, O=obey file 
File_Name  Input line, filename, or obey file name 










