XYGATE User Authentication Reference Manual
XYGATE
®
User Authentication
™
Reference Manual
Introduction
XYPRO Technology Corporation xxii Proprietary and Confidential
System/SEEP Issues Affecting XUA
This section discusses the SEEP issues that affect XUA.
PHANDLE
There is a field called a phandle in the Safeguard-to-XUA message that identifies the
process doing the logon. In the first message to XUA for a particular logon dialog, it is
correct. In subsequent messages for the same dialog it might be incorrect. To work
around this, XUA uses a keyword called PHANDLE_MISMATCH_CHECK, which has
to have a value of OFF to prevent checking for matching phandle for subsequent
messages.
All Aliases are treated as the Underlying ID
Safeguard erroneously supplies the underlying id of the subject login name for an alias
instead of the alias name during a logon. To work around this anomaly, XUA uses a
keyword called SUBJECT_LOOKUP that, if set to ON, will cause XUA to do a process
info lookup on the logging-on process to get the correct subject login name.
FTP Logon with more than 32-character password
Logon using FTP will not work if a password with more than 32-characters is used to
authenticate. This includes the impersonation logon. To work around this problem, a
password of less than 32-characters must be used when authenticating via FTP.
PQ_SEEP_OBJECT
Due to an anomaly in Safeguard’s SEEP interface, when a user changes his or her
password during logon, Safeguard sends the request to the AUTHENTICATION SEEP
instead of to the PASSWORD SEEP. To work around this, XUA has a keyword
PQ_SEEP_OBJECT that, if pointed to the right PASSWORD SEEP object, instructs
XUA to forward the request to the password SEEP (XPQ).
Safeguard reports
Due to an anomaly in Safeguard, the XYGATEUA process PAID is entered as the
subject ID (the ID making the logon request) in the Safeguard audit trail. XUA records
the subject user correctly in its own audit trail. So if you are required to report on
logons, you should use the XUA audit trail rather than Safeguard’s.
Remote Logon requests
There is a field in the message from Safeguard to the SEEP that tells the SEEP
whether or not the subject is locally authenticated, remotely authenticated or
unauthenticated. Currently, there is a Safeguard anomaly that always sets the value to
“unauthenticated” for local users. This causes all subjects (that is, the person
requesting the logon) to appear as local users. To work around this, XUA uses a
keyword called SUBJECT_LOOKUP which if set to ON, causes XUA to determine
whether or not the subject process is local or remote. If it is remote, it will determine