Domain: | USER-ADMINISTRATION |
Privileges: | STD-PROCESSING, SECURITY-ADMINISTRATION, |
This command displays the protection attributes or access history of a user ID.
The scope of the information output varies depending on the command-issuing user:
the global user administrator (USER-ADMINISTRATION) may request information about all user IDs on all pubsets
group administrators may request information about all user IDs of their own group and the subordinate group structure on the specified pubset
all other users may request information about their own user ID only
If USER-ID=*ALL is specified, the scope of information actually output is dependent on the rules set out above.
SHOW-LOGON-PROTECTION | ||||||||||||||||||||||||||||||||||||||||||||||||
|
USER-IDENTIFICATION = *ALL / list-poss(48): *OWN / <name 1..8 with-wild>
User IDs whose protection attributes or access history are to be output.
PUBSET = *ALL / list-poss(2000): *HOME / <cat-id 1..4>
Pubset whose user catalog is to be evaluated.
PUBSET = *ALL
All accessible pubsets are to be evaluated.
PUBSET = *HOME
The user catalog of the home pubset is to be evaluated.
PUBSET = <cat-id 1..4>
The user catalog of the specified pubset is to be evaluated.
OUTPUT =
This defines the output medium for the requested information.
OUTPUT = *SYSOUT
The information is output to the system file SYSOUT (in interactive mode to the data display terminal).
OUTPUT = *SYSLST
The information is output to the system file SYSLST.
INFORMATION = *ATTRIBUTES(...) / *LOGON-HISTORY(...)
Specifies the scope of the output.
INFORMATION = *ATTRIBUTES(...)
The protection attributes are output.
SCOPE =
Specifies which protection attributes are output.
SCOPE = *LOGON-DEFAULT
The protection attributes for access control which are currently effective are output.
In addition to the attributes which have been defined explicitly for the user ID, the current default attributes for access control are displayed, provided they apply for the user ID.
SCOPE = *USER-IDENTIFICATION
The attributes for which the default attributes for access control apply are output, together with the attributes which were explicitly specified for the user ID.
SCOPE = *ALL
In addition to the attributes that were explicitly specified for the user ID, the output shows the current default attributes for the access control, as far as they are valid for the user ID. The default attributes are marked with an asterisk (*).
INFORMATION = *LOGON-HISTORY(...)
The access history, i.e. information about the last ten access attempts, is output (see also section "Single Sign On with Kerberos").
ACCESS-TYPE =
Selects the access types that are to be logged.
ACCESS-TYPE = *ALL
All access attempts are logged independently of their type.
ACCESS-TYPE = list-poss(6): *DIALOG / *BATCH / *POSIX / *OPERATOR / *FT
Only access attempts of the specified type are logged: Dialog, Batch, POSIX, Operating and File-Transfer.
RESULT =
Controls logging as a function of the result of the access attempts.
RESULT = *ALL
The access attempts are logged independently of their result.
RESULT = *ACCEPTED
Successful attempts are logged.
RESULT = *LAST-ACCEPTED
Only the last successful attempt for each access type is logged.
RESULT = *REJECTED
Unsuccessful access attempts are logged.
SORT-LIST =
Specifies a sort sequence for logging.
SORT-LIST = *BY-DATE-AND-TIME
The entries are sorted by date and time.
SORT-LIST = *BY-ACCESS-TYPE
The entries are ordered by access type. The sequence of access types is: Dialog, Batch, POSIX, Operating and File-Transfer.
LINES =
Specifies whether the number of entries for output is restricted.
LINES = *STD
The number of entries for output is not restricted. You can abort output by pressing the K2 key.
LINES = <integer 1..40>
Specifies the maximum number of entries for output.
PRINCIPAL =
Length of the display of the Kerberos name in the logon history.
PRINCIPAL = *SHORT
The Kerberos name is displayed in shortened form in the logon history.
PRINCIPAL = *FULL
The Kerberos name is displayed in full length in the logon history together with the processor and station name.
Command return codes
(SC2) | SC1 | Maincode | Meaning |
0 | CMD0001 | Command executed without errors | |
2 | 0 | SRM6001 | Command executed with a warning |
32 | SRM6020 | System error during command processing | |
64 | SRM6040 | Semantic error during command processing | |
130 | SRM6030 | Command cannot be processed at the present time |
Examples: output of protection attributes
|
|
Example: output of access history
|
Significance of the output
The following table explains the significance of the individual field names and indicates which fields are output for which types of system access
Field name | Meaning | |
Date | Date of last access attempt | |
Time | Time of last access attempt | |
Type | Type of access (see table "Access history types") | |
Cnt | Number of unsuccessful attempts | |
Result | Successful/reason for rejection (see table "Access history results") | |
TSN | TSN of the dialog task | |
Subject | BATCH | User ID and TSN of initiator of batch task |
DIALOG | Processor name and terminal name of the terminal | |
DIA-KRBROS | Kerberos name | |
DIA-PERSON | Processor name and terminal name of the terminal | |
DIA-USERID | Personal user ID of initiator of dialog task | |
NET-KRBROS | Kerberos name | |
OPER-CONS | Operator console name | |
POS-BATCH | User ID and TSN of initiator of batch task | |
POS-REMOTE | Processor name and user ID of the UNIX client, if applicable | |
RLOGIN | Processor name | |
STANDARD | User ID and TSN of initiator of task |
Table 4:
Fields in the access history display
The following table shows the possible contents of the Type (of access history) field and the significance of these contents:
Type | Meaning |
BATCH | Batch |
DIALOG | Interactive mode |
DIA-KRBROS | Interactive mode with personal user ID with Kerberos authentication |
DIA-PERSON | Interactive mode with personal user ID |
DIA-USERID | Interactive mode with logon user ID |
FT | File Transfer Admission |
FT-BATCH | File Transfer Batch without password check |
FT-NO-PASS | File Transfer Admission without password check |
NET-KRBROS | Interactive mode with Kerberos authentication |
OPER-CONS | Operator at the physical console in incompatible mode |
OPER-PROG | Operator with dynamic authorization name as program (@CONSOLE) |
OPER-TERM | Operator with dynamic authorization name in interactive mode ($CONSOLE) |
POS-BATCH | POSIX batch commands |
POS-REMOTE | POSIX remote commands |
RLOGIN | POSIX remote login |
STANDARD | No speciific access type |
UCON | Operator with generated authorization name |
Table 5: Access history types
The following table shows the possible contents of the Result (of access history) field and the significance of these contents:
Result | Meaning | |
ACCEPT | Access was permitted | |
ACCESS LOCK | Logon type | Locked (access type: ACCESS) |
ACCNUM INVALID | Account numbers | Not entered (ACCOUNT) |
BGUARD DENIED | Guard | Batch access denied (GUARD-NAME) |
CALLER INVALID | Caller ID | Access denied (USER-ACCESS) |
CERTIF INVALID | Certificate | Not entered (CERTIFICATE) |
CLIENT KRBxxxx | Kerberos ticket | Invalid ticket, the Kerberos name of the client is logged. |
DGUARD DENIED | Guard | Interactive access refused (GUARD-NAME) |
DIALOG KRBxxxx | Kerberos ticket | Incorrect ticket, the station name is logged. |
NGUARD DENIED | Guard | Network interactive access refused (GUARD-NAME) |
PASSWD EXPIRED | Logon password | Expiration date exceeded (LIFETIME-INTERVAL) |
PASSWD INVALID | Logon password | Incorrect (LOGON-PASSWORD) |
PGUARD DENIED | Guard | POSIX access refused (GUARD-NAME) |
PLOGON REJECT | personal logon | Interactive access refused (PERSONAL-LOGON) |
PRIPAL INVALID | Kerberos principal | Not entered (PRINCIPAL) |
SERIAL ERROR | User ID | User ID was modified |
SERVER KRBxxxx | Kerberos ticket | Incorrect ticket, the server principal is logged. |
SUSPND DENIED | User ID | User ID suspended (SUSPEND-ATTRIBUTES) |
TERMIN INVALID | Terminal | Not entered (TERMINAL) |
TERSET DENIED | Terminal set | Access denied (TERMINAL-SET) |
TGUARD DENIED | Terminal set guard | Access denied (TERM-SET/GUARD-NAME) |
USERID EXPIRED | User ID | Expiration date exceeded (EXPIRATION-DATE) |
USERID INACTIV | User ID | User ID inactive (INACTIVITY-LIMIT) |
USERID INVALID | User ID | Internal inconsistency |
USERID LOCK | User ID | Locked (LOCK-USER) |
Table 6: Access history results
Output in S variables
The command’s INFORMATION operand is used to define the S variables for which values are entered. The following specifications are possible for INFORMATION:
Notation in command | Conditions in table |
INFORMATION = *ATTRIBUTES(SOPE=*LOGON-DEF/*USER-ID) | 1 |
INFORMATION = *ATTRIBUTES(SCOPE=*ALL) | 2 |
INFORMATION = *LOGON-HISTORY | 3 |
Output information | Name of the S variable | T | Contents | Condition |
Caller ID in access history for | var(*LIST).ACCESS(*LIST).CALLER | S | <name 1..8> | 3 |
Counter in access history | var(*LIST).ACCESS(*LIST).COUNT | I | <integer 1..999> | 3 |
Date in access history | var(*LIST).ACCESS(*LIST).DATE | S | <date 10> | 3 |
Personal user ID in access history | var(*LIST).ACCESS(*LIST).PERS-USER-ID | S | <name 1..8> | 3 |
Principal name | var(*LIST).ACCESS(*LIST).PRINCIPAL | S | <name 0..1800> | 3 |
Processor in access history for | var(*LIST).ACCESS(*LIST).PROCESSOR | S | <name 1..8> | 3 |
Result in access history | var(*LIST).ACCESS(*LIST).RESULT | S | ACCEPT | 3 |
Caller TSN in access history for | var(*LIST).ACCESS(*LIST).RTSN | S | <alphanum-name | 3 |
Terminal in access history for | var(*LIST).ACCESS(*LIST).STATION | S | <name 1..8> | 3 |
Time in access history | var(*LIST).ACCESS(*LIST).TIME | S | <time 8> | 3 |
TSN in access history | var(*LIST).ACCESS(*LIST).TSN | S | <alphanum-name | 3 |
Type in access history | var(*LIST).ACCESS(*LIST).TYPE | S | BATCH | 3 |
Access control active in batch | var(*LIST).BATCH.ACCESS | S | *LOGON-DEF | 1 |
Is access control in batch mode a | var(*LIST).BATCH.ACCESS-DEF | B | FALSE | 2 |
Name of the guard with which | var(*LIST).BATCH.GUARD | S | *NONE | 1 |
Password check active in batch | var(*LIST).BATCH.PASS-CHECK | S | *NO | 1 |
Authorized user ID in batch mode | var(*LIST).BATCH.USER-ACCESS(*LIST) | S | ’’ | 1 |
Selection of authorized user ID in | var(*LIST).BATCH.USER-ACCESS-DEFI | S | *ALL | 1 |
System access control active in | var(*LIST).DIALOG.ACCESS | S | *LOGON-DEF | 1 |
Is access control in interactive | var(*LIST).DIALOG.ACCESS-DEF | T | FALSE | 2 |
Obsolete. Output only for | var(*LIST).DIALOG.CHIP(*LIST) | S | ’’ | 1 |
Obsolete. Output only for | var(*LIST).DIALOG.CHIP-DEFI | S | *NO-PROT | 1 |
Name of the guard with which | var(*LIST).DIALOG.GUARD | S | *NONE | 1 |
Password check in interactive | var(*LIST).DIALOG.PASS-CHECK | S | *NO | 1 |
Personal logon active for | var(*LIST).DIALOG.PERS-LOGON | S | *NO | 1 |
Name of the front-end processor | var(*LIST).DIALOG.TER(*LIST).PROCESS | S | ’’ | 1 |
BCAM name of the computer from | var(*LIST).DIALOG.TER(*LIST).STATION | S | ’’ | 1 |
Selection of approved terminals for | var(*LIST).DIALOG.TER-DEFI | S | *ALL | 1 |
Terminal sets of class GROUP | var(*LIST).DIALOG.TER-SET.GROUP(*LIST) | S | <name 1..8> | 1 |
Group name | var(*LIST).DIALOG.TER-SET.GROUP-ID | S | <name 1..8> | 1 |
Terminal sets of class SYSTEM | var(*LIST).DIALOG.TER-SET.SYSTEM(*LIST) | S | <name 1..8> | 1 |
Terminal sets of class USER | var(*LIST).DIALOG.TER-SET.USER(*LIST) | S | <name 1..8> | 1 |
User ID | var(*LIST).DIALOG.TER-SET.USER-ID | S | <name 1..8> | 1 |
Interactive mode access protected | var(*LIST).DIALOG.TER-SET-DEFI | S | *NO-PROT | 1 |
Encryption type of the ticket in the | var(*LIST).ENC-TYPE | I | <integer | 3 |
Expiration date of the user ID | var(*LIST).EXPIR-DATE | S | *LOGON-DEF | 1 |
Is the expiration date of the user ID | var(*LIST).EXPIR-DATE-DEF | T | FALSE | 2 |
Time (specified in days) as of | var(*LIST).EXPIR-WARN | I | *LOGON-DEF | 1 |
Is the expiration warning for the | var(*LIST).EXPIR-WARN-DEF | B | FALSE | 2 |
Dimension of inactivity limit | var(*LIST).INACTIVITY.DIM | S | ’’ | 1 |
End of the inactivity period | var(*LIST).INACTIVITY.EXPIR-DATE | S | <date 10> | 1 |
Inactivity limit | var(*LIST).INACTIVITY.LIFETIME | I | <integer 1..366> | 1 |
Inactivity limit active | var(*LIST).INACTIVITY.PAR | S | *LOGON-DEF | 1 |
Is the inactivity limit a standard | var(*LIST).INACTIVITY.PAR-DEF | B | FALSE | 2 |
Key version of the ticket in the | var(*LIST).KEY-VERSION | I | <integer | 3 |
Access control in network | var(*LIST).NET-DIALOG.ACCESS | S | *LOGON-DEF | 1 |
Is access control in network | var(*LIST).NET-DIALOG.ACCESS-DEF | B | FALSE | 2 |
Number of certification authority | var(*LIST).NET-DIALOG.CERT(*LIST). | S | *ANY | 1 |
Certificate number | var(*LIST).NET-DIALOG.CERT(*LIST). | S | <integer | 1 |
Certificate protection in network | var(*LIST).NET-DIALOG.CERT-DEFI | S | *NO-PROT | 1 |
Name of the guard with which | var(*LIST).NET-DIALOG.GUARD | S | *NONE | 1 |
Password check in network | var(*LIST).NET-DIALOG.PASS-CHECK | S | *YES | 1 |
Principal name | var(*LIST).NET-DIALOG.PRINCIPAL(*LIST) | S | <name 1..1800> | 1 |
Network dialog access via | var(*LIST).NET-DIALOG.PRINCIPAL-DEFI | S | *ALL | 1 |
Terminal sets of the class GROUP | var(*LIST).NET-DIALOG.TER-SET. | S | <name 1..8> | 1 |
Group name | var(*LIST).NET-DIALOG.TER-SET. | S | <name 1..8> | 1 |
Terminal sets of the class | var(*LIST).NET-DIALOG.TER-SET. | S | <name 1..8> | 1 |
Terminal sets of the class USER | var(*LIST).NET-DIALOG.TER-SET. | S | <name 1..8> | 1 |
User ID | var(*LIST).NET-DIALOG.TER-SET.USER-ID | S | <name 1..8> | 1 |
Network interactive access | var(*LIST).NET-DIALOG.TER-SET-DEFI | S | *NO-PROT | 1 |
Access control active for console | var(*LIST).OPER-CONS.ACCESS | S | *LOGON-DEF | 1 |
Is access control during console | var(*LIST).OPER-CONS.ACCESS-DEF | B | FALSE | 2 |
Password check active for console | var(*LIST).OPER-CONS.PASS-CHECK | S | *YES | 1 |
Authentication procedure for | var(*LIST).OPER-PROG.ACCESS | S | *LOGON-DEF | 1 |
Authentication procedure for | var(*LIST).OPER-PROG.ACCESS-DEF | B | FALSE | 2 |
Password check for programmed | var(*LIST).OPER-PROG.PASS-CHECK | S | *NO | 1 |
Authentication procedure for | var(*LIST).OPER-TER.ACCESS | S | *LOGON-DEF | 1 |
Is the authentication procedure via | var(*LIST).OPER-TER.ACCESS-DEF | B | FALSE | 2 |
Obsolete. Output only for | var(*LIST).OPER-TER.CHIP(*LIST) | S | ’’ | 1 |
Obsolete. Output only for | var(*LIST).OPER-TER.CHIP-DEFI | S | *NO-PROT | 1 |
Password check for dialog partner | var(*LIST).OPER-TER.PASS-CHECK | S | *NO | 1 |
Number of locked passwords | var(*LIST).PASS.ACT-BLOCKED | I | <integer 0..100> | 1 |
Actual number of password | var(*LIST).PASS.ACT-CHA | I | <integer 0..100> | 1 |
Blocking time for passwords | var(*LIST).PASS.BLOCKING-TIME | I | <integer 1..32767> | 1 |
Number of permitted password | var(*LIST).PASS.CHA-PER-PER | I | <integer 1..100> | 1 |
Dimension of password lifetime | var(*LIST).PASS.DIM | S | ’’ | 1 |
Expiration date of password | var(*LIST).PASS.EXPIR-DATE | S | *LOGON-DEF | 1 |
Is the expiration date of the | var(*LIST).PASS.EXPIR-DATE-DEF | B | FALSE | 2 |
Time (specified in days) as of | var(*LIST).PASS.EXPIR-WARN | I | *LOGON-DEF | 1 |
Is the expiration date of the | var(*LIST).PASS.EXPIR-WARN-DEF | B | FALSE | 2 |
Lifetime of the password | var(*LIST).PASS.LIFETIME | S | *LOGON-DEF | 1 |
Is the expiration date of the | var(*LIST).PASS.LIFETIME-DEF | B | FALSE | 2 |
Password for user ID defined | var(*LIST).PASS.LOGON-PASS | B | FALSE | 1 |
Authorization for management of | var(*LIST).PASS.MANAGE | S | *LOGON-DEF | 1 |
Is the authorization for managing | var(*LIST).PASS.MANAGE-DEF | B | FALSE | 2 |
Minimum complexity of the | var(*LIST).PASS.MIN-COMPLEX | S | *LOGON-DEF | 1 |
Is the minimal complexity of the | var(*LIST).PASS.MIN-COMPLEX-DEF | B | FALSE | 2 |
Minimum length of the password | var(*LIST).PASS.MIN-LEN | S | *LOGON-DEF | 1 |
Is the minimal length of the | var(*LIST).PASS.MIN-LEN-DEF | B | FALSE | 2 |
List of password changes active | var(*LIST).PASS.PASS-MEMORY | S | *LOGON-DEF | 1 |
Is the list of password changes a | var(*LIST).PASS.PASS-MEMORY-DEF | B | FALSE | 2 |
Period (in days) for which the | var(*LIST).PASS.PER | I | <integer 1..32767> | 1 |
Authorization to replace an expired | var(*LIST).PASS.UNLOCK-EXPIR | S | *LOGON-DEF | 1 |
Is the authorization for replacing | var(*LIST).PASS.UNLOCK-EXPIR-DEF | B | FALSE | 2 |
Access control for POSIX remote | var(*LIST).POSIX-REM.ACCESS | S | *LOGON-DEF | 1 |
Is access control during POSIC | var(*LIST).POSIX-REM.ACCESS-DEF | B | FALSE | 2 |
Name of the guard with which | var(*LIST).POSIX-REM.GUARD | S | *NONE | 1 |
Terminal sets of the class GROUP | var(*LIST).POSIX-REM.TER-SET. | S | <name 1..8> | 1 |
Group name | var(*LIST).POSIX-REM.TER-SET.GROUP-ID | S | <name 1..8> | 1 |
Terminal sets of the class | var(*LIST).POSIX-REM.TER-SET. | S | <name 1..8> | 1 |
Terminal sets of the class USER | var(*LIST).POSIX-REM.TER-SET. | S | <name 1..8> | 1 |
User ID | var(*LIST).POSIX-REM.TER-SET.USER-ID | S | <name 1..8> | 1 |
POSIX remote access protected | var(*LIST).POSIX-REM.TER-SET-DEFI | S | *NO-PROT | 1 |
Access control for POSIX access | var(*LIST).POSIX-RLOG.ACCESS | S | *LOGON-DEF | 1 |
Is access control during POSIX | var(*LIST).POSIX-RLOG.ACCESS-DEF | B | FALSE | 2 |
Name of the guard with which | var(*LIST).POSIX-RLOG.GUARD | S | *NONE | 1 |
Password check for POSIX access | var(*LIST).POSIX-RLOG.PASS-CHECK | S | *NO | 1 |
Terminal sets of the class GROUP | var(*LIST).POSIX-RLOG.TER-SET. | S | <name 1..8> | 1 |
Group name | var(*LIST).POSIX-RLOG.TER-SET. | S | <name 1..8> | 1 |
Terminal sets of the class | var(*LIST).POSIX-RLOG.TER-SET. | S | <name 1..8> | 1 |
Terminal sets of the class USER | var(*LIST).POSIX-RLOG.TER-SET. | S | <name 1..8> | 1 |
User ID | var(*LIST).POSIX-RLOG.TER-SET.USER-ID | S | <name 1..8> | 1 |
POSIX Rlogin access protected | var(*LIST).POSIX-RLOG.TER-SET-DEFI | S | *NO-PROT | 1 |
Password check for RBATCH | var(*LIST).RBATCH.PASS-CHECK | S | *NO | 1 |
Permitted number of failed | var(*LIST).SUSPEND.COUNT | I | <integer 0..32767> | 1 |
Is the permitted number of invalid | var(*LIST).SUSPEND.COUNT-DEF | B | FALSE | 2 |
Dimension of observation time | var(*LIST).SUSPEND.OBS-DIM | S | ’’ | 1 |
Observation time | var(*LIST).SUSPEND.OBS-TIME | I | <integer 0..32767> | 1 |
Is the observation time a default | var(*LIST).SUSPEND.OBS-TIME-DEF | B | FALSE | 2 |
Suspension active | var(*LIST).SUSPEND.PAR | S | *LOGON-DEF | |
Is the suspension active time a | var(*LIST).SUSPEND.PAR-DEF | B | FALSE | 2 |
Subject to be suspended | var(*LIST).SUSPEND.SUBJECT | S | *USER-ID | 1 |
Is the object to be suspended | var(*LIST).SUSPEND.SUBJECT-DEF | B | FALSE | 2 |
Dimension of suspension time | var(*LIST).SUSPEND.SUS-DIM | S | ’’ | 1 |
Suspension time | var(*LIST).SUSPEND.SUS-TIME | I | <integer 0..32767> | 1 |
Is the suspension time a standard | var(*LIST).SUSPEND.SUS-TIME-DEF | B | FALSE | 2 |
User ID | var(*LIST).USER-ID | S | <name 1..8> | 1,3 |
Locking of user ID activated | var(*LIST).USER-ID-LOCK | B | FALSE | 1 |
Table 6: Access history results