Previous Topic: APPL ClassNext Topic: CALENDAR Class


AUTHHOST Class

Each record in the AUTHHOST class defines an authentication host in eTrust SSO.

The key of the AUTHHOST class record is the name of the authorization host.

The following definitions describe the properties contained in this class record. Most properties are modifiable and can be manipulated using selang or the administration interfaces. Non-modifiable properties are marked as informational.

ACL

Defines a list of accessors (users and groups) permitted to access the resource, and the accessors' access types.

Each element in the access control list (ACL) contains the following information:

Accessor

Defines an accessor.

Access

Defines the access authority that the accessor has to the resource.

Use the access parameter with the authorize or authorize- command to modify the ACL.

AZNACL

Defines the authorization ACL. The authorization ACL is an ACL that allows access to a resource based on the resource description. The description is sent to the authorization engine, not the object. Typically, when an AZNACL is used, the object is not in the database.

CALACL

Defines a list of the accessors (users and groups) that are permitted to access the resource, and their access types according to the Unicenter NSM calendar status.

Each element in the calendar access control list (CALACL) contains the following information:

Accessor

Defines an accessor.

Calendar

Defines a reference to a calendar in Unicenter TNG.

Access

Defines the access authority that the accessor has to the resource.

Access is permitted only when the calendar is ON. Access is denied in all other cases.

Use the calendar parameter with the authorize command to permit user or group access to the resource according to the access defined in the calendar ACL.

CALENDAR

Represents a Unicenter TNG calendar object for user, group, and resource restrictions in CA ControlMinder. CA ControlMinder fetches Unicenter TNG active calendars at specified time intervals.

CATEGORY

Defines one or more security categories assigned to a user or a resource.

COMMENT

Defines additional information that you want to include in the record. CA ControlMinder does not use this information for authorization.

Limit: 255 characters.

CREATE_TIME

(Informational) Displays the date and time when the record was created.

DAYTIME

Defines the day and time restrictions that govern when an accessor can access a resource.

Use the restrictions parameter with the chres, ch[x]usr, or ch[x]grp commands to modify this property.

The resolution of daytime restrictions is one minute.

ETHINFO

Ethernet information for a host.

GROUPS

The list of GAUTHHOST or CONTAINER records a resource record belongs to.

To modify this property in an AUTHHOST class record, you must change the MEMBERS property in the appropriate CONTAINER or GAUTHHOST record.

Use the mem+ or mem‑ parameter with the chres, editres or newres command to modify this property.

KEY

Used by eTrust SSO only.

NACL

The NACL property of a resource is an access control list that defines the accessors that are denied authorization to a resource, together with the type of access that they are denied (for example, write). See also ACL, CALACL, PACL. Each entry in the NACL contains the following information:

Accessor

Defines an accessor.

Access

Defines the type of access that is denied to the accessor.

Use the authorize deniedaccess command, or the authorize- deniedaccess- command, to modify this property.

NOTIFY

Defines the user to be notified when a resource or user generates an audit event. CA ControlMinder can email the audit record to the specified user.

Limit: 30 characters.

OWNER

Defines the user or group that owns the record.

PATH

Used by eTrust SSO only.

PROPERTIES

In UNIX dbdump only

RAUDIT

Defines the types of access events that CA ControlMinder records in the audit log. RAUDIT derives its name from Resource AUDIT. Valid values are:

all

All access requests.

success

Granted access requests.

failure

Denied access requests (default).

none

No access requests.

CA ControlMinder records events on each attempted access to a resource, and does not record whether the access rules were applied directly to the resource, or were applied to a group or class that had the resource as a member.

Use the audit parameter of the chres and chfile commands to modify the audit mode.

SECLABEL

Defines the security label of a user or resource.

Note: The SECLABEL property corresponds to the label[-] parameter of the chres and ch[x]usr commands.

SECLEVEL

Defines the security level of an accessor or resource.

Note: This property corresponds to the level[-] parameter of the ch[x]usr and chres commands.

SEED

Used by eTrust SSO only.

SERNUM

The serial number of the authentication host.

UACC

Defines the default access authority for the resource, which indicates the access granted to accessors who are not defined to CA ControlMinder or who do not appear in the ACL of the resource.

Use the defaccess parameter with the chres, editres, or newres command to modify this property.

UNTRUST

Defines whether the resource is untrusted or trusted. If the UNTRUST property is set, accessors cannot use the resource. If the UNTRUST property is not set, the other properties listed in the database for the resource are used to determine accessor's access authority. If a trusted resource is changed in any way, CA ControlMinder automatically sets the UNTRUST property.

Use the trust[-] parameter with the chres, editres, or newres command to modify this property.

UPDATE_TIME

(Informational) Displays the date and time when the record was last modified.

UPDATE_WHO

(Informational) Displays the administrator who performed the update.

USER_DIR_PROP

(Informational). The name of the user's directory.

USER_FORMAT

Used by eTrust SSO only.

USERALIAS

Contains all the user's aliases that are defined to a specific authhost.

WARNING

Specifies whether Warning mode is enabled. When Warning mode is enabled on a resource, all access requests to the resource are granted, and if an access request violates an access rule, a record is written to the audit log.