XYGATE User Authentication Reference Manual

XYGATE
®
User Authentication
Reference Manual
Contents
XYPRO Technology Corporation vi Proprietary and Confidential
Chapter 2. Node-Conditional Processing in the UAACL File .................................. 33
2.1 Conditional Operators ........................................................... 33
2.2 Node Names or Patterns ........................................................ 35
2.3 Conditional Text ................................................................. 36
2.4 Configuring Logon Controls ..................................................... 37
Chapter 3. Configuring Control Logons Based on the Ancestor Program ................... 39
3.1 Procedure ......................................................................... 39
Chapter 4. Configuring Control Logons Based on Port ......................................... 41
4.1 Procedure ......................................................................... 41
Chapter 5. Configuring Control Logons Based on Requestor Program ...................... 43
5.1 Procedure ......................................................................... 43
Chapter 6. Configuring Control Logons Based on Time ........................................ 45
6.1 Procedure ......................................................................... 45
Chapter 7. Considering Additional Logon Authorization Controls ........................... 47
7.1 Keywords .......................................................................... 47
Chapter 8. Deciding on Failed-Logon Consequences ........................................... 49
8.1 Keywords .......................................................................... 49
Chapter 9. Deciding on the Amount of Logon-Specific Auditing ............................. 51
9.1 Keywords .......................................................................... 51
Chapter 10. Configuring Control Logons via Alternative Authentication Databases ....... 53
10.1 Alternative Authentication Databases ........................................ 53
Chapter 11. Configuring the Impersonation Feature ............................................ 55
11.1 Setting up Impersonation ....................................................... 55
11.2 Examples of Impersonation Logons ............................................ 57
Chapter 12. Configuring the LDAP Interface ...................................................... 59
12.1 Configuration Steps .............................................................. 59