Valid on UNIX
The CA Access Control authorization daemon. The executable file seosd is the main CA Access Control daemon. A daemon is a process that has disconnected from both its controlling TTY and its parent process. The CA Access Control daemon makes the runtime decisions required to grant or deny access to a resource.
Only root can invoke seosd, and only a user with the ADMIN or OPERATOR attribute can shut it down.
The CA Access Control daemon opens, reads, and updates the database. No other process can access this database while the CA Access Control daemon is running. The CA Access Control daemon also blocks any write, delete, or rename access to critical files, such as the CA Access Control audit and trace files and, optionally, the CA Access Control binary files.
The seosd executable becomes a daemon only if one or both of the following conditions is true:
If none of these conditions are true, seosd remains a regular process, connected to the terminal from which you invoked it.
During startup, seosd also invokes the following processes:
The CA Access Control daemon is completely initialized only after these daemons are also running. After initialization, these three daemons maintain a type of handshaking protocol to ensure they are all alive and responding. If one of these daemons is found to be absent, one of the other two daemons automatically restarts it.
This command has the following format:
seosd [‑d|argument]
Note: If you enter seosd with no arguments, it runs seosd as a daemon.
Ignored. However, if you specify an argument, seosd remains a regular process.
Runs seosd as a daemon and forces tracing to the trace_file.
| Copyright © 2012 CA. All rights reserved. | Tell Technical Publications how we can improve this information |