XYGATE Compliance PRO (XSW) Reference Manual

XYGATE
®
Compliance PRO
Reference Manual
Chapter 11. Access Analysis Mapping
XYPRO Technology Corporation 200 Proprietary and Confidential
If you want a shorter list that presents just one row per XAC command per object file
(OBJECT), you might want to use the COMMANDs Query instead and group the grid
by OBJECT.
11.8.7 List by Run-as User Query
This query is intended to list users who can invoke XAC Commands which will execute
as the selected Run-as user. It returns the list of commands that run-as the selected
user. Use this query to create a list of all users who can invoke XAC commands that
run as a particular user, SUPER.SUPER, for example. There will be a row per user in
the Commands ACL.
If you want a shorter list that presents just one row per XAC command Run-as USER,
you might want to use the COMMANDs Query instead and group the grid by USER.
11.8.8 Userlist by Command Query
This query is intended to list all users who can invoke the selected XAC command. It
returns a row per user in the selected commands ACL list. The list of command
names is presented in the drop-down list.
11.9 OSS Files
Access Mapping for OSS files can be performed on any collection that includes the
OSS Files Entity.
Note: Access mapping for OSS does not address “other” access, as this tends to
easily exceed the capability to display results. Other access is assumed to be
allowed or disallowed by the nature of the OSS environment.
The OSS Access Analysis output grid for OSS files includes the following columns.
Node Name
The FullPath name separated into fields that can be
sorted
First Directory
Directory Name
File Name
FullPath
The full name of the OSS file or directory
U Group / UGid
The group/user name/number of the file owner
U Name /U Uid
U Orphan
Is the owner an orphan Y(es) or N(o)
G Name / G Gid
The group name and number of the file group owner
G Orphan
If the group an orphan Y(es) or N(o)
Sitcky/SetGid/SetUid
Security flags Y(es) or N(o)