Adding Firewall Settings for a User to Assume Different Authority for a Server
To add Firewall settings for a user to assume a different user's authority for specified servers, enter 6 in the Selection field of the Add User Security screen, shown in Adding Firewall Settings for a User (STRFW > 3 > 1, F6, Selection: 6).
The Work with Alternative Users screen appears:
Work with Alternative Users User . . . . . . . . . . EXAM You can define an alternative way of checking object authority. This is done by service. Specify a "User" whose authority (without groups) will be checked in Firewall. If Swap=Y, this extends to system authority ches.. Check per Swap user Server "User" (Y-Yes) FTPSRV FTP Server-Incoming Rqst Validation FTPCLN FTP Client-Outgoing Rqst Validation REXEC REXEC Server Request Validation RMTSQL Original Remote SQL Server SQL Database Server - SQL access & Show NDB Database Server - data base access RMTSRV Remote Command/Program Call FILSRV File Server DTAQ Data Queue Server FILTFR Original File Transfer Function F3=Exit F4=Prompt F12=Cancel |
The screen shows a list of servers known to Firewall. Each line contains a short Server name and longer text description for the server, and the following fields:
Check per "User"
The username of another user. If the user exists, the current user assumes the object authority settings for that user when working with that server within iSecurity. To see a list of possible users, press the F4 key.
Swap User (Y-Yes)
If this is set to Y, any activity by that user on the server is reported to the operating system as being by the user named in the Check per "User" field. If the user does not exist, the attempt to swap object authorities fails.
Otherwise, while the user assumes the authority of the user listed in the Check per "User" field, the activity is reported and logged as being by the current user.