HPlogo User's Guide to MPE/iX Security: HP 3000 MPE/iX Computer Systems > Chapter 1 Introduction

System Security

» 

Technical documentation

Complete book in PDF
» Feedback

 » Table of Contents

 » Index

System security is provided by security features built into MPE/iX, and the way the account structure of the system is organized. System security features fall into five categories:

  • Identification of users.

  • Authentication of users.

  • Authorization of users.

  • Control of access to system resources.

  • Auditing system usage.

Identification

Every user must have a unique logon identity, or ID, by which he or she is identified as a legitimate system user. Without a valid ID, a user cannot log on to the system. Commonly, user IDs consist of a user name and account name.

Authentication

When a user logs on, the system attempts to authenticate the logon ID. The system checks its directory for the existence of the ID, then verifies the user's identity by checking the password. Entry of an incorrect ID or password will prevent access to the system.

Authorization

System access is provided at several levels, from the lowest, available to all users, to the highest, open only to system and security management. When users are first authorized to use the system, they are assigned codes that identify the level of access to which they are permitted. As users execute system functions and tasks, the system constantly checks their authority to do so. The various levels of user authority are described under User Roles.

The system checks a user's identity and capabilities to determine access level. For example, some commands are available to all users (lowest level of capability). Other commands are available only to System Managers (SM capability), or System Operators (OP capability). Each time a user issues a command, the system checks the user's capabilities to make sure he or she is allowed to use that command.

Programs also have capabilities, which are assigned by the programmer at the time the program is created. The capabilities assigned to a program allow it to access particular functions. When a program that has special capabilities is run, the system does not require the user to have those capabilities.The program runs and exercises its capabilities in conjunction with those of the user. In addition to the capabilities just described, some programs check user capabilities before issuing certain functions.

Defining User Roles

Assigned capabilities and account membership determine a person's role as an MPE/iX user. In general, roles fall into one of three categories: system administrators, account managers, or general user.

  • System administrators are responsible for system operation. Job titles include System Manager, System Supervisor, and System Operator (the operator at the console). Each type of system administrator has a different role, different capabilities, and different responsibilities.

  • Account Managers usually have the title Account Manager. Account Managers are responsible for administering an account. Each account has at least one manager.

  • A general user has no administrative capabilities other than managing his or her own password, files, and UDC,s (User Defined Commands).

The System Manager

A System Manager is a user with System Manager (SM) capability. SM capability lets you manage the system and create accounts, groups, and users. In MPE/iX, SM capability is associated with the SYS account. The system tape you receive with your HP 3000 Computer System designates an initial System Manager (MANAGER.SYS). The initial System Manager can assign SM capability to other users.

The System Manager's functions include:

  • Creating and maintaining accounts, groups, and users.

  • Changing account, group, and user passwords.

  • Obtaining reports of account use for billing and other purposes.

  • Managing regular system backups and establishing standard backup procedures. (The System Supervisor performs backups.)

  • Designating system level UDCs.

  • Configuring, managing, and auditing system security.

  • Creating and managing Access Control Definitions for files and devices.

  • Supervising other System Administrators.

The System Manager automatically has all capabilities. A System Manager can perform all System Supervisor, System Operator, Account Manager, and general user tasks.

The System Supervisor

The System Supervisor (OP capability) exercises day-to-day control of the system. OP capability permits you to:

  • Store and restore files.

  • Manage system scheduling subqueues.

  • Alter the system configuration.

  • Maintain system and user logging facilities.

  • Display certain items of system information.

The System Manager assigns OP capability to accounts. An Account Manager who has OP capability in his or her account can assign it to other users in the account.

The System Operator

The System Operator is the user logged on to the System Console. The System Operator derives his or her capabilities from the System Console, not from any capabilities inherent in the title. The System Operator also may be known as the Console Operator. In many systems, users with System Supervisor capability serve as System Operator. The System Operator is responsible for:

  • Monitoring the status of the system.

  • Monitoring the console.

  • Responding to console requests.

The Account Manager

An Account Manager (AM capability) manages all users and groups in an account. The System Manager assigns an Account Manager for an account when creating that account. The Account Manager can, in turn, assign Account Manager capability to other users within the account.

An Account Manager's functions include:

  • Creating and maintaining groups.

  • Changing user passwords within the group.

  • Creating and maintaining users.

  • Creating and managing ACDs for files in the account.

  • Managing account level UDCs.

  • Insuring the security of the account.

  • Storing and restoring account files (some files may also require SM, OP, or PM capability).

General Users

General users are those who are not System Managers, System Supervisors, System Operators, or Account Managers. General users' responsibilities with respect to account structure and security include:

  • Managing and maintaining the security of the files they create.

  • Protecting their own user passwords.

  • Establishing and maintaining their own UDCs.

Feedback to webmaster