XYGATE User Authentication Reference Manual
XYGATE
®
 User Authentication
™
 Reference Manual    
Contents 
XYPRO Technology Corporation  vi  Proprietary and Confidential 
Chapter 2.  Node-Conditional Processing in the UAACL File .................................. 33 
2.1  Conditional Operators ........................................................... 33 
2.2  Node Names or Patterns ........................................................ 35 
2.3  Conditional Text ................................................................. 36 
2.4  Configuring Logon Controls ..................................................... 37 
Chapter 3.  Configuring Control Logons Based on the Ancestor Program ................... 39 
3.1  Procedure ......................................................................... 39 
Chapter 4.  Configuring Control Logons Based on Port ......................................... 41 
4.1  Procedure ......................................................................... 41 
Chapter 5.  Configuring Control Logons Based on Requestor Program ...................... 43 
5.1  Procedure ......................................................................... 43 
Chapter 6.  Configuring Control Logons Based on Time ........................................ 45 
6.1  Procedure ......................................................................... 45 
Chapter 7.  Considering Additional Logon Authorization Controls ........................... 47 
7.1  Keywords .......................................................................... 47 
Chapter 8.  Deciding on Failed-Logon Consequences ........................................... 49 
8.1  Keywords .......................................................................... 49 
Chapter 9.  Deciding on the Amount of Logon-Specific Auditing ............................. 51 
9.1  Keywords .......................................................................... 51 
Chapter 10.  Configuring Control Logons via Alternative Authentication Databases ....... 53 
10.1  Alternative Authentication Databases ........................................ 53 
Chapter 11.  Configuring the Impersonation Feature ............................................ 55 
11.1  Setting up Impersonation ....................................................... 55 
11.2  Examples of Impersonation Logons ............................................ 57 
Chapter 12.  Configuring the LDAP Interface ...................................................... 59 
12.1  Configuration Steps .............................................................. 59 










