XYGATE User Authentication Reference Manual
XYPRO Technology Corporation  43  Proprietary and Confidential 
Chapter 5.  Configuring Control Logons 
Based on Requestor 
Program 
REQUESTOR is an optional criterion. Every logon request comes from a process 
executing the USER_AUTHENTICATE_ or VERIFYUSER procedure. The process for 
executing one of these two system calls is called the REQUESTOR. The XUA rules 
based on the requestor, deal with rules based on exactly which program the user is 
logging on to. 
5.1  Procedure 
The following syntax and example shows how to restrict logons based on the 
requestor program. 
Syntax:
REQUESTOR <object filename> 
The Example below will deny everyone from the ACLGroup $EVERYONE to logon as 
anybody if the requestor is $SYSTEM.ZTCPIP.FTPSERV and the IP address is 
satisfied. 
Example: How to restrict logons based on the requesting program 
UAGROUP FTP-LOGON-CONTROL 
 DESCRIPTION "RESTRICTED IP ADDRESS FOR FTP" 
 !Selection Criteria: 
 FROM_USER $EVERYONE 
 TO_USER $EVERYONE 
 PORT $* 3.1.1.16 
 RESULT_DENIED 
 REQUESTOR $SYSTEM.ZTCPIP.FTPSERV 
Refer to the REQUESTOR keyword discussion on page 280 in Appendix B: “The 
UAACL File.” 










