Setting Additional Controls for Passthrough Logons
To set controls for Passthrough logons, select 1. Passthrough Logon from the Passthrough Security screen (STRFW > 13) as shown in Setting Additional Controls and Displaying Logs for Passthrough Logons.
The Work with Passthrough Security screen appears:
Work with Passthrough Security Type options, press Enter. 1=Select 3=Copy 4=Delete Subset . . . Source Source Target Automatic Opt System User* User Sign-on *ALL *ALL *ANY *FRCSIGNON RAZLEE1 *ALL QSECOFR *FRCSIGNON RAZLEE2 QSECOFR USRTGT *ALTLOGON RAZLEE3 SRCUSER TGTUSER *ALLOW Bottom F3=Exit F6=Add new F8=Print F12=Cancel |
Passthrough logons are considered for distinct or generic request patterns, in which a Source User on a Source System requests to connect to the current system as a Target User.
The body of the screen consists of five fields, starting with an Opt field for entering options. Each line refers to one request pattern.
The remaining fields are:
Source System
The name of the system from which the user is logging on. This can be a single name or generic* name or *ALL for all systems for which there are no more specific rules.
Source User
A user name from the remote system. This can be a single name or generic* name or *ALL for all users for whom there are no more specific rules.
Target User
The user on the current system as whom the remote user would like to log on. This can be a single user name, *SAME to connect as the same user, or *ANY for any user name. For a list of known users, press the F4 key.
Automatic Sign-on
How Firewall reacts to the sign-on attempt. Possible values include:
- *ACCEPT: Accept logon request
- *REJECT: Reject logon request
- *FRCSIGNON: Force the user to sign on even if the system is configured to accept an automatic signon.
- *ALTLOGON: Accept logon request if it is from the same IP as your system.
To add Firewall settings for a user and system, press the F6 key. The Add Passthrough Security screen appears, as shown in Adding Firewall Settings for Passthrough Logons.
To modify Firewall settings for a user and system, enter 1 in the Opt field for that user and system. The Modify Passthrough Security screen appears, as shown in Modifying Firewall Settings for Passthrough Logons.
To copy Firewall settings from user and system to another, enter 3 in the Opt field for the original user and system. The Copy Passthrough Security screen appears, as shown in Copying Firewall Settings for Passthrough Logons.
To delete Firewall settings for a user and system, enter 4 in the Opt field for the user and system. The Delete Passthrough Security screen appears, as shown in Deleting Firewall Settings for Passthrough Logons.