HP 3000 Manuals

User's Guide to MPE/iX Security MPE/iX 5.0 Documentation


User's Guide to MPE/iX Security

Table of Contents

 User's Guide to MPE/iX Security
   User's Guide to MPE/iX Security : COPYRIGHT NOTICE

   Ch 1.  Introduction
       The User's Guide to MPE/iX Security
      Physical Security
      Procedural Security
      System Security
          Identification
          Authentication
          Authorization
          Defining User Roles
          The System Manager
          The System Supervisor
          The System Operator
          The Account Manager
          General Users
      Security Policy
      Components of the Account Structure
          The Individual Account
          Files
          Standard Characteristics
          Creating Naming Conventions
          User Names
          Group Names
          File Names
      Hierarchical file system (HFS)
          HFS file names
          HFS syntax

   Ch 2.  Accessing the System
       Getting Started
          To Log On
      Guidelines for Selecting Passwords
      Protecting Your System with Passwords
      Changing Your Password

   Ch 3.  Protecting Your System with Access Control Definitions (ACDs)
       Access Control Definitions (ACDs)
          What is an ACD?
          How do ACDs work
          Access modes
          User specifications
          Required ACDs
          HFS Object creation
          HFS Object deletion
          HFS File renaming
          File owner
      Appropriate Privilege
          System manager capability
          Account manager capability
      Execute (X) Access
      User Identification
          SAVE access in MPE groups
          CWD and File Security
      ACD examples
      Tasks Involving System Security
          Listing ACDs
          Listing ACDs for directories and files in directories
          Changing access to HFS files and directories
          Creating ACDs
          Assigning ACDs
          Adding an ACD Pair
          Replacing an ACD Pair
          Replacing ACDs
          Modifying ACDs
          Deleting ACDs
             Deleting an ACD Pair
             Deleting Optional ACDs
          Copying ACDs
             Copying ACD Pairs
             Copying Files That Have ACDs

   Ch 4.  Protecting Your Files with Capabilities, File Access Restrictions and Lock
    Ch 4.  Protecting Your Files with Capabilities, File Access Restrictions and Lock
       File System Security Features
    Ch 4.  Protecting Your Files with Capabilities, File Access Restrictions and Lock
       File System Security Features
          Capabilities
    Ch 4.  Protecting Your Files with Capabilities, File Access Restrictions and Lock
       File System Security Features
          Account, Group, and User Capabilities
    Ch 4.  Protecting Your Files with Capabilities, File Access Restrictions and Lock
       File System Security Features
          Listing Capabilities
    Ch 4.  Protecting Your Files with Capabilities, File Access Restrictions and Lock
       File System Security Features
          Listing Capabilities
             Listing Account Capabilities
    Ch 4.  Protecting Your Files with Capabilities, File Access Restrictions and Lock
       File System Security Features
          Listing Group Capabilities
    Ch 4.  Protecting Your Files with Capabilities, File Access Restrictions and Lock
       File System Security Features
          Listing Group Capabilities
             Listing User Capabilities
      Capabilities Table
          Account Librarian (AL)
          Account Manager (AM)
          Batch Access (BA)
          Use Communications Software (CS)
          Diagnostician (DI)
          Extra Data Segments (DS)
          Group Librarian (GL)
          Interactive Access (IA)
          Multiple RIN (MR)
          Network Administrator (NA)
          Node Manager (NM)
          Use Nonshareable Devices (ND)
          Use Mountable Volume Sets (UV)
          Privileged Mode (PM)
          Process Handling (PH)
          Programmatic Sessions (PS)
          Save User Files Permanently (SF)
          System Manager (SM)
          System Supervisor (OP)
          Use User Logging Facility (LG)
          Create Mountable Volume Sets (CV)
      Restricting File Access
          Access Modes
          User Types
          Specifying File Access Restrictions
             Account-Level File Security
             Group-Level Security
             File-Level Security
             Default File Access Restrictions
      Lockwords
      Releasing and Securing File Security
          Summary

   Ap A. Error Messages
       General Error Messages
      General Error Messages (contd)
      ACD Related Error Messages
   INDEX
       Index



MPE/iX 5.0 Documentation