HPlogo HP Security Monitor/iX Manager's Guide: HP 3000 MPE/iX Computer Systems > Chapter 3 Managing System Users with Passwords and Logon Restrictons

Managing System Access With Logon Restrictions

» 

Technical documentation

Complete book in PDF
» Feedback

 » Table of Contents

 » Index

With one exception, the following procedures control system access by placing limitations on users when they attempt to log on to the system. The exception automatically logs an inactive session off the system.

Controlling Access With Logon UDCs

Logon UDCs (a type of User Defined Command) can be used to confine the system access capabilities of individual users within rigidly defined limits.

A logon UDC is one that executes whenever a user logs on. Each level in the system can have a logon UDC that executes at that level. System Managers create and control system logon UDCs, Account Managers create and control account logon UDCs, and users create and control their own logon UDCs. System and Account Managers also can control user UDCs.

You might use the system level logon UDC to prevent users from accessing MPE/iX commands. For example, a logon UDC with NOBREAK runs an application program then automatically logs users off the system as soon as they exit the program. In this case, users have access only to the application program, but not to the MPE/iX command interpreter or other system facilities.

Creating a UDC

To create a UDC, type the commands you wish to use in a text file, then catalog the file with the :SETCATALOG command. If a UDC is to be a logon UDC, declare it as such when you create it. Set the UDC level (system, account, or user) at the time you catalog it. The MPE/iX Commands Reference Manual (32033-90006) describes in detail how to create and catalog UDCs.

Feedback to webmaster