Previous Topic: VM Native AUTOLOG SupportNext Topic: Step 1: AUTOLOG or XAUTOLOG Command Limiting Validation


AUTOLOG or XAUTOLOG Validation

The following terms describe CA ACF2 for VM AUTOLOG support:

Initiator machine

Indicates the virtual machine (or user of that machine) that issues the AUTOLOG or XAUTOLOG command.

Target machine

Indicates the virtual machine autologged through the AUTOLOG or XAUTOLOG command.

Password suppression

Indicates that when you must supply a password with AUTOLOG, XAUTOLOG, or LOGON, this option (by default) requires that you enter the password following a prompt. CA ACF2 for VM does not display the password when you enter it; it automatically suppresses it. If you enter a clear text password on the same line as the XAUTOLOG command, CA ACF2 for VM rejects the command if password suppression is in effect. CA ACF2 for VM cannot recognize a password entered on the same line as the AUTOLOG command.

AUTOLOG and XAUTOLOG CP Directory Statement

Indicates the method native VM uses to authorize class G virtual machines to autolog other virtual machines.

The special CA ACF2 for VM logonid attributes for the AUTOLOG or XAUTOLOG command include:

AUTOALL

Indicates that a virtual machine with this privilege can autolog any virtual machine without specifying a password, no matter what privileges the machines might have. Like AUTONOPW, AUTOALL has no effect on the logon process. The user of a machine with this privilege can log on through normal logon procedures.

AUTONOPW

Indicates that a virtual machine with this privilege can be autologged without specifying a password. AUTONOPW has no effect on the logon process. The user of a machine with this privilege can log on through normal logon procedures.

AUTOONLY

Indicates that a virtual machine with this attribute cannot be logged onto a device, even if the machine is a group virtual machine.

The process CA ACF2 for VM uses on VM systems to validate the AUTOLOG and XAUTOLOG command consists of the following steps:

  1. AUTOLOG or XAUTOLOG command limiting validation
  2. Conditional password validation
  3. Autolog resource validation
  4. Propagating user IDs for group logon.
  5. A brief explanation of each step follows.