HP-UX AAA Server A.08.02 Administrator's Guide

Contents
26 Customizing the HP-UX AAA Server Using the Finite State Machine.............290
States .................................................................................................................................290
Using Xstring to call Policy ...............................................................................................292
Using Xstring to Call an Alternate authfile ..........................................................................292
Event Names ......................................................................................................................292
Predefined Event Names ..................................................................................................292
Creating New Names .....................................................................................................294
Actions ...............................................................................................................................295
FSM Tables.....................................................................................................................296
Custom State Tables .............................................................................................................297
Tracking Versions ............................................................................................................297
Examples .......................................................................................................................297
Preprocessing Module ................................................................................................297
Interim Logging ...............................................................................................................298
Custom Logging Format ...................................................................................................298
Proxy Accounting Messages..............................................................................................298
27 Customizing the HP-UX AAA Server Using Policies....................................300
Policy Overview....................................................................................................................300
Defining a Policy in a Decision File.........................................................................................301
Action Commands...........................................................................................................302
The delete Command...................................................................................................302
The insert Command....................................................................................................303
The modify Command.................................................................................................304
The exit Command......................................................................................................305
The log Command......................................................................................................306
The if Command.........................................................................................................306
Attribute Specifications.....................................................................................................308
Attribute Names..........................................................................................................309
Vendor Names...........................................................................................................309
Attribute Instance Specifications....................................................................................309
No Instance Specification........................................................................................309
Numeric Instance Specification.................................................................................309
Keyword Instance Specification................................................................................309
Attribute Functions.......................................................................................................310
The count Attribute Function.....................................................................................310
The length Attribute Function....................................................................................311
The strcat Attribute Function.....................................................................................311
The substr Attribute Function.....................................................................................312
The tolower Attribute Function..................................................................................315
The toupper Attribute Function..................................................................................315
Value Types.....................................................................................................................315
Arithmetic Expressions......................................................................................................316
Arithmetic Operator Precedence and Association............................................................316
Supported Boolean Operators...........................................................................................317
Boolean Operator Precedence and Association...............................................................318
Type Compatibility...........................................................................................................319
Invoking a Policy..................................................................................................................320
Invoking Policies Through Predefined Policy Hooks................................................................320
Request Ingress Policy..................................................................................................320
User Policy.................................................................................................................321
Invoking Policy from User Profiles..............................................................................321
288 Contents