XYGATE User Authentication Reference Manual
XYGATE
®
 User Authentication
™
 Reference Manual    
Contents 
XYPRO Technology Corporation  xii  Proprietary and Confidential 
A47:  MONITOR .........................................................................232 
A48:  MONITOR_ACCESS_CHECK ......................................................233 
A49:  MONITOR_AUDIT_SERVER ......................................................233 
A50:  MONITORAUDIT ..................................................................234 
A51:  PASSWORD_EXPIRES_MESSAGE ................................................234 
A52:  PASSWORD_MAY_CHANGE ......................................................235 
A53:  PASSWORD_REQUIRED ..........................................................235 
A54:  PERUSE_OBJECT .................................................................236 
A55:  PHANDLE_MISMATCH_CHECK ..................................................236 
A56:  PQ_SEEP_OBJECT ...............................................................237 
A57:  PRIORITY .........................................................................237 
A58:  RADIUS_AUTHENTICATE ........................................................238 
A59:  RADIUS_HOST ....................................................................239 
A60:  RADIUS_PORT ....................................................................239 
A61:  RADIUS_PROXY_ENV ............................................................239 
A62:  RADIUS_PROXY_IP_PROC .......................................................240 
A63:  RADIUS_PROXY_LOG ............................................................240 
A64:  RADIUS_PROXY_TIMEOUT ......................................................240 
A65:  RADIUS_REQUIRE_PASSWORD ..................................................241 
A66:  RSA_AUTHENTICATE ............................................................242 
A67:  RSA_PROXY_ENV .................................................................243 
A68:  RSA_PROXY_IP_PROC ...........................................................243 
A69:  RSA_PROXY_LOG ................................................................243 
A70:  RSA_PROXY_TIMEOUT...........................................................244 
A71:  RSA_REQUIRE_PASSWORD ......................................................244 
A72:  SUBJECT_LOOKUP ...............................................................245 
A73:  SUPERSUPEROK ..................................................................246 
Appendix B:  The UAACL File ........................................................................ 247 
B1:  Sample UAACL File ..............................................................248 
B2:  Limits on UAACL Entries ........................................................251 
B3:  Classifying the ACLGroups .....................................................252 
B4:  Configuring TIMEGroups ........................................................252
B
5:  Configuring UAGroups ..........................................................254 
B6:  The UAGroup Keywords ........................................................255 










