XYGATE User Authentication Reference Manual

XYGATE
®
User Authentication
(XUA) 1.85 Reference Manual
Chapter 11. Configuring the Impersonation Feature
XYPRO Technology Corporation 58 Proprietary and Confidential
In Example 5 below, the password of alias super1 has expired.
Example 5: Password expired TO_USER
TACL 1> logon super1
Password://OPER.TOM//mypass
*ERROR* Impersonation not allowed since user's password has expired.
Note: If the password of the impersonator and the TO_USER has expired, then
XYGATEUA sets the logon rejection message as
*ERROR* Impersonation not
allowed since your password has expired
.
However, because of a peculiarity in Safeguard, the logon is rejected where the
message
*ERROR* Invalid username or password is passed on instead of the
message set by XUA.
In Example 6 below, TECH.USER1 was able to su by impersonating as alias 79tst1.
Members of the TECH group can do su only on an XAC audited terminal because the
port in the following UAGROUP is set to $*.#xoa:$system.xygateac.xygateoa.
Example 6: Allowing selected users to su to webmaster by impersonation
UAGROUP AUTH-USERS-su-2-PRIVIDS
DESCRIPTION "Tech users can logon as the webmaster to perform web maintenance
tasks only from XAC Terminal"
!Selection Criteria:
FROM_USER TECH.*
TO_USER Alias:”webmaster”
REQUESTOR /bin/su
PORT $*.#xoa:$system.xygateac.xygateoa
IMPERSONATION_FROM_USER 79,255 ALIAS:"79tst1"
IMPERSONATION OPTIONAL
AUDIT_ACCESS_PASS ON
AUDIT_ACCESS_FAIL ON
/G/VSNS/TECH1> su
Password: //79tst1//pass79
#whoami
WEB.MASTER
#