HP-UX AAA Server A.08.02.10 Administrator's Guide HP-UX 11i v3 (T1428-90093, November 2013)

Contents
26 Customizing the HP-UX AAA Server Using the Finite State Machine.............291
States .................................................................................................................................291
Using Xstring to call Policy ...............................................................................................293
Using Xstring to Call an Alternate authfile ..........................................................................293
Event Names ......................................................................................................................293
Predefined Event Names ..................................................................................................293
Creating New Names .....................................................................................................295
Actions ...............................................................................................................................296
FSM Tables.....................................................................................................................297
Custom State Tables .............................................................................................................298
Tracking Versions ............................................................................................................298
Examples .......................................................................................................................298
Preprocessing Module ................................................................................................298
Interim Logging ...............................................................................................................299
Custom Logging Format ...................................................................................................299
Proxy Accounting Messages..............................................................................................299
27 Customizing the HP-UX AAA Server Using Policies....................................301
Policy Overview....................................................................................................................301
Defining a Policy in a Decision File.........................................................................................302
Action Commands...........................................................................................................303
The delete Command...................................................................................................303
The insert Command....................................................................................................304
The modify Command.................................................................................................305
The exit Command......................................................................................................306
The log Command......................................................................................................307
The if Command.........................................................................................................307
Attribute Specifications.....................................................................................................309
Attribute Names..........................................................................................................310
Vendor Names...........................................................................................................310
Attribute Instance Specifications....................................................................................310
No Instance Specification........................................................................................310
Numeric Instance Specification.................................................................................310
Keyword Instance Specification................................................................................310
Attribute Functions.......................................................................................................311
The count Attribute Function.....................................................................................311
The length Attribute Function....................................................................................312
The strcat Attribute Function.....................................................................................312
The substr Attribute Function.....................................................................................313
The tolower Attribute Function..................................................................................316
The toupper Attribute Function..................................................................................316
Value Types.....................................................................................................................316
Arithmetic Expressions......................................................................................................317
Arithmetic Operator Precedence and Association............................................................317
Supported Boolean Operators...........................................................................................318
Boolean Operator Precedence and Association...............................................................319
Type Compatibility...........................................................................................................320
Invoking a Policy..................................................................................................................321
Invoking Policies Through Predefined Policy Hooks................................................................321
Request Ingress Policy..................................................................................................321
User Policy.................................................................................................................322
Invoking Policy from User Profiles..............................................................................322
Contents 289