XYGATE User Authentication Reference Manual

XYGATE
®
User Authentication
Reference Manual
Contents
XYPRO Technology Corporation xii Proprietary and Confidential
A47: MONITOR .........................................................................232
A48: MONITOR_ACCESS_CHECK ......................................................233
A49: MONITOR_AUDIT_SERVER ......................................................233
A50: MONITORAUDIT ..................................................................234
A51: PASSWORD_EXPIRES_MESSAGE ................................................234
A52: PASSWORD_MAY_CHANGE ......................................................235
A53: PASSWORD_REQUIRED ..........................................................235
A54: PERUSE_OBJECT .................................................................236
A55: PHANDLE_MISMATCH_CHECK ..................................................236
A56: PQ_SEEP_OBJECT ...............................................................237
A57: PRIORITY .........................................................................237
A58: RADIUS_AUTHENTICATE ........................................................238
A59: RADIUS_HOST ....................................................................239
A60: RADIUS_PORT ....................................................................239
A61: RADIUS_PROXY_ENV ............................................................239
A62: RADIUS_PROXY_IP_PROC .......................................................240
A63: RADIUS_PROXY_LOG ............................................................240
A64: RADIUS_PROXY_TIMEOUT ......................................................240
A65: RADIUS_REQUIRE_PASSWORD ..................................................241
A66: RSA_AUTHENTICATE ............................................................242
A67: RSA_PROXY_ENV .................................................................243
A68: RSA_PROXY_IP_PROC ...........................................................243
A69: RSA_PROXY_LOG ................................................................243
A70: RSA_PROXY_TIMEOUT...........................................................244
A71: RSA_REQUIRE_PASSWORD ......................................................244
A72: SUBJECT_LOOKUP ...............................................................245
A73: SUPERSUPEROK ..................................................................246
Appendix B: The UAACL File ........................................................................ 247
B1: Sample UAACL File ..............................................................248
B2: Limits on UAACL Entries ........................................................251
B3: Classifying the ACLGroups .....................................................252
B4: Configuring TIMEGroups ........................................................252
B
5: Configuring UAGroups ..........................................................254
B6: The UAGroup Keywords ........................................................255