XYGATE User Authentication Reference Manual

XYGATE
®
User Authentication
(XUA) 1.85 Reference Manual
Chapter 16. What-if Testing
XYPRO Technology Corporation 153 Proprietary and Confidential
Response? qa123
User : XYPRO.QA (222,031) on 2011-03-28 16:58:03.992948
User Expires : * None *
Password Expires : * None *
Password May Change : * None *
Password Must Change : * None *
Password Expiry Grace : 15 days
Last Logon : 2011-03-16 17:07:34.522623
Last Unsuccessful Lgn : 2011-03-16 17:07:25.992429
Fail count : * None *
Static fail count : 124
Frozen/Thawed : Thawed
Last Modification Time: 2011-03-16 17:07:34.485872
From User : 255,255 SUPER.SUPER
Requestor : $NONE $NONE.NONE.NONE
Ancestor : $NONE $NONE.NONE.NONE
To User : 222,031 XYPRO.QA
Port : $NONE $NONE.NONE.NONE
Dialog ID : 001 Tag=2 Dialog=On
State : 10 RAD authenticate w/pw
subproc check_for_impersonation:begin
Impersonation chars not in password field
Bypassing impersonation since current acl does not require it
Process state 10
Getting RADIUS password from structure.
Setting dialog state to 00010 RAD authenticate w/pw
Mapped UID from XYPRO.QA to qa
Sending Request to RADIUS proxy:
0024YN1U00000008qa+qa123
Received from RADIUS proxy:
0027NN5Y00000011000800a248,
State_RADIUS_AUTHENTICATE return value = 005;
Setting dialog state to 00005 Done
timegroup_check using TIMEGROUP values.
user not in any TIMEGROUP, logon allowed
password-expire field reset in user record
password-expire field reset in userax record
User : XYPRO.QA (222,031) on 2011-03-28 16:58:04.089642
User Expires : * None *
Password Expires : * None *
Password May Change : * None *
Password Must Change : * None *
Password Expiry Grace : 15 days
Last Logon : 2011-03-16 17:07:34.522623
Last Unsuccessful Lgn : 2011-03-16 17:07:25.992429
Fail count : * None *
Static fail count : 124
Frozen/Thawed : Thawed
Last Modification Time: 2011-03-16 17:07:34.485872
UAGROUP RADIUS_AUTHENTICATE Replying with access YES
UAGROUP RADIUS_AUTHENTICATE Outcome is LOGON
SEEP return 00000,00000,00000
Access result - YES using GROUP RADIUS_AUTHENTICATE
In the Example above, user XYPRO.QA was mapped to alias qa based on the
mapping configuration of the UAGROUP RADIUS_AUTHENTICATE. The status of the
user account was checked with the Safeguard. In this case, the mapping was used
and RADIUS authentication was allowed.