HP 3000 Manuals

Access Control Definition Security (ACD) [ Accessing Files Programmer's Guide ] MPE/iX 5.0 Documentation


Accessing Files Programmer's Guide

Access Control Definition Security (ACD) 

MPE/iX implements a discretionary access control (DAC) mechanism that is
consistent with the guidelines laid down by the National Computer
Security Center.

The MPE/iX implementation, access control definitions (ACD), is a subset
of the DAC mechanism.  ACDs maintain a list of users and the access modes
that each user has to files and devices.

ACD scope 

An ACD that is associated with a file overrides the classic MPE file
access matrix and lockwords, which are described later in this chapter in
"Traditional Mechanism for File Security" .

By associating an ACD with a file or a device, the owner of the file or
device may define which users have access to that file or device and
which modes of access are available to other users.  When a file is
associated with an ACD, the ACD is put into its file label extension.
The ACD contains a list of access modes paired with users.

Owners 

Only those who own a file or a device may associate it with an ACD.

Files.     

the owner of a file is any one of these three users:

   *   The creator of the file with which an ACD is associated

   *   The user who as am capability in the account in which the file
       resides

   *   The user who has sm capability on the system in which the file
       resides

Devices.     

The System Manager (SM) is the owner of all of the devices on a system.

How acds work 

When a user attempts to access a file or to acquire a device, HPFOPEN or
FOPEN is called, and the system makes the following checks:

   *   Is the user an owner of the file or device; that is, is the user
       the creator of the file, the account manager (AM capability),
       where the file resides or the system manager (SM capability)?

       If so, permission is granted, and the checking ends.

   *   If not, is there an ACD associated with the file or device?

          *   If there is no ACD, the system looks for authorization in
              the traditional MPE/iX file access matrix and lockwords.

          *   If there is an ACD, the system searches, in this order, for
              the user:

                 1.  specific names (username.accountname)

                 2.  account groupings (@.accountname)

                 3.  system groupings (@.@)

                     If a match is found, the user can access the device
                     or file--as authorized (read, write, execute, and so
                     on)--and no further checking is done.

                     If there is no match, the user is denied entry, and
                     no further checking is done.

It is important to note that if an ACD exists, the MPE/iX file access
matrix and lockwords are never consulted.

ACD modes 

Any device or a file can be paired with an ACD.

An ACD is associated with a file or a device by pairing access modes with
users.  A user is any username.accountname specification.

The modes of access are:

R                     Read
W                     Write
A                     Append
L                     Lock
X                     Execute
NONE                  None
RACD                  Read and copy the ACD permission file

You could define an ACD as follows:

     ACD = (R,W:MGR.ACCTING, DENNIS.LEE; R:@.PAYROLL; A:@.@)

The users MGR.ACCTING and DENNIS.LEE can read and write to the file
associated with this example ACD. Anyone in the PAYROLL account can read
it, and anyone on the system can append to it.  For example, no one but
DENNIS.LEE and the owners can overwrite the file, and only the owners can
lock it.


NOTE If an ACD exists and if you are not explicitly given permission to access a file or a device, you do not have access.
Managing ACDs with commands and intrinsics Use MPE/iX commands to manage ACDs interactively, through the command interpreter. Use MPE/iX intrinsics to manage ACDs in a program. Commands. These MPE/iX commands accept ACD-related parameters or incorporate ACD associations in their operation: ALTSECT Permits the addition, creation, deletion, modification, copying, and listing of ACD attributes. COPY Always copies the ACD associated with the source file to the target file, if an ACD is present. FCOPY Permits copying ACD attributes. FILE Permits the equation of one file/device-ACD specification to another file/device-ACD specification. LISTFILE Permits the listing of the ACD attributes associated with a file or device. RELEASE Returns a warning when an ACD is associated with a file. RESTORE Accomodates ACDs. SECURE Returns a warning when an ACD is associated with a file. SHOWDEV Permits the listing of ACD attributes associated with a device. STORE Accomodates ACDs. Detailed discussions of these commands are found in the MPE/iX Commands Reference Manual (32650-90003). Intrinsics. HPACDPUT Permits the addition, creation, deletion, modification, copying, and listing of ACD attributes. HPACDINFO Returns security attributes. HPFOPEN Permits the creation of of an ACD. The intrinsic FOPEN cannot be modified to give it the option of creating an ACD. You must use HPFOPEN. Detailed discussions of these intrinsics are found in the MPE/iX Intrinsics Reference Manual (32650-90028). Preserving ACDs Device ACDs are not permanent objects; you must redefine them every time that the system is rebooted. The easiest way to do this is to put ALTSEC commands into the SYSSTART file, either directly or in a command file. File ACDs are permanent objects; they do survive a reboot. When you store files to tape, FCOPY and STORE save the files' ACDs, too--unless you specify otherwise. If you are not an owner of the file and you do not have RACD permission, you get an error if you try to copy the ACD. Instead, choose the NOACD parameter. Managing ACDs You may manage ACDs interactively through MPE/iX commands or programmatically through MPE/iX intrinsics. Creating ACDs. ------------------------------------------------------------------------------------------- | | | Command Intrinsic Purpose | | | ------------------------------------------------------------------------------------------- | | | ALTSEC Create an ACD for an existing device or file | | | | HPACDPUT Create an ACD for an existing device or file | | | ------------------------------------------------------------------------------------------- Examples. To assign Read access to user SAM.DOE, Write access to JOE.DOE, no access (None) to all users in the DESIGN account, and Execute access to all users in all accounts (except those users in the DESIGN account, enter this:. ALTSEC FILEA.XX.DESIGN;NEWACD=(R:SAM.DOE;W:JOE.DOE;NONE:@.DESIGN;X:@.@) To add an ACD that prevents any user except OPERATOR.SYS from accessing LDEV 7 (a tape drive), enter this: ALTSEC 7,LDEV;NEWACD=(R,W:OPERATOR.SYS) The user must have SM capability to do this. This short program uses HPACDPUT in creating an ACD for a file called TARGET: program acdput(input, output); var status : integer; filename : packed array [1..28] of char; ACD : packed array [1..256] of char; procedure HPACDPUT;intrinsic; begin filename := 'TARGET'; ACD := '(x:@.@;r,w:mgr.sys)' ACD[20] := #m; HPACDPUT(status, 1, filename, 20, ACD); if status <> 0 then writeln('HPACDPUT failed. Status = ', status); end. When you create a new file with the COPY, FCOPY, STORE, or RESTORE commands, you can use the command parameters to create the ACDs for the new file. * COPY The COPY command automatically copies any ACD attributes from the source file to the target file, provided that the user is an owner of the source file or has RACD access to that file. COPY FILEA,FILEB * FCOPY The ;COPYACD parameter of the FCOPY command permits the user to copy a file and its ACD, provided that the user is an owner or has RACD permission. FCOPY <fcopycommand>;COPYACD * STORE To store all of the files on a system to tape, including their ACDs, enter this: FILE T;DEV=TAPE STORE @.@.@;*T;COPYACD COPYACD is the default. You must have access to any ACD-protected files being stored. * SM and OP can store any ACD-protected file on the system. * AM can store any ACD-protected file in the manager's account.[REV END] * Users can store any ACD-protected files that they own, provided that they have Read access to the file and RACD access to the file if ;COPYACD is specified. * Others can store ACD-protected files for which they have RACD permission, provided that they have Read access to the file and RACD access to the file if ;COPYACD is specified. * You must have PM access to a PM file in order to store it. * RESTORE To restore all of the files on tape and copies the ACD attributes of the file to disk, enter this: FILE T;DEV=TAPE RESTORE *T;@;KEEP;SHOW;COPYACD COPYACD is the default. NOACD prevents the copying of the ACD attributes. [REV BEG] * SM and OP can restore any ACD-protected file on the system. * AM can restore any ACD-protected file in the manager's account. * Users can restore any ACD-protected files that they own, provided that they have Read access to the file and RACD access to the file if ;COPYACD is specified. * Others can restore ACD-protected file for which they have RACD permission, provided that they have Read access to the file and RACD access to the file if ;COPYACD is specified. * You must have PM access to a PM file in order to store it. [REV END] Listing ACDs. ------------------------------------------------------------------------------------------- | | | Command Intrinsic Purpose | | | ------------------------------------------------------------------------------------------- | | | LISTFILE Show ACDs for files | | | | SHOWDEV Show ACDs for devices | | | | HPACDINFO Show ACDs for files and devices | | | | HPACDPUT Show ACDs for files and devices | | | ------------------------------------------------------------------------------------------- Examples. The LISTFILE command with option 4 shows the ACD status of a file in this fashion: LISTFILE FILEA,4 **************************** FILEA.XX.DESIGN SYSTEM READ: ANY SECURITY--WRITE: AC (ACCT) APPEND: AC LOCK: AC EXECUTE: ANY SYSTEM READ: GU SECURITY--WRITE: GU (GROUP) APPEND: GU LOCK: GU EXECUTE: GU SYSTEM READ: ANY FCODE: 0 SECURITY--WRITE: ANY CREATOR: ** (FILE) APPEND: ANY LOCKWORD: ** LOCK: ANY **SECURITY IS ON EXECUTE: ANY **ACD EXISTS FOR XX.DESIGN: NONE (Other ACD status reports are NO ACD and ACD CORRUPTED.) The LISTFILE command with option -2 gives a detailed ACD report on a file in this fashion: LISTFILE FILEA,-2 FILE = FILEA ************** ACD ENTRIES ************** SAM.DOE : R JOE.DOE : W @.DESIGN : NONE @.@ : X The SHOWDEV command displays the ACD attributes of a device in this fashion: SHOWDEV 14;ACD LDEV AVAIL OWNERSHIP VOLID DEN ASSOCIATION 14 SPOOLED SPOOLER OUT ACD ENTRIES: @.@ : R,W,X This short program uses HPACDINDFO to retrieve the number of entries and first user in the ACD of a file called TARGET: program acdinfo(input, output); type shortint = -32768..32767; var status : integer; filename : packed array [1..28] of char; numentry : shortint; firstuser : packed array [1..18] of char; procedure HPACDINFO;intrinsic; begin filename := 'TARGET'; HPACDINFO(status, 1, filename, 21, numentry, firstuser); if status = 0 then begin writeln('Number of Entires: ', numentry:1); writeln('First UserSpec : ', firstuser); end; end. Copying ACDs. ------------------------------------------------------------------------------------------- | | | Command Intrinsic Purpose | | | ------------------------------------------------------------------------------------------- | | | ;COPYACD parameter of Copy an ACD from one file to another | | the ALTSEC command | | | ------------------------------------------------------------------------------------------- Examples. To copy the ACD associated with FILEB to FILEA, enter this: ALTSEC FILEA.XX.DESIGN;COPYACD=FILEB.XX.DESIGN Only an owner, or a user granted RACD (read ACD) authorization, can copy the ACD from FILEB. To copy the ACD attributes of LDEV 7 to LDEV 23, enter this: ALTSEC 23,LDEV;COPYACD=7,LDEV [REV BEG] Only users with SM capability may do this. By definition, users having SM capability are owners of all the files and devices on a system. Those users may give themselves access to any file or device on the system.[REV END] Modifying ACDs. ------------------------------------------------------------------------------------------- | | | Command Intrinsic Purpose | | | ------------------------------------------------------------------------------------------- | | | ALTSEC To change an ACD | | | | HPACDPUT To change an ACD | | | ------------------------------------------------------------------------------------------- Adding ACD pairs. To confer Read access on JOE.DESIGN for FILEA, enter this:. ALTSECT FILEA.XX.DESIGN;ADDPAIR=(R:JOE.DESIGN) Replacing ACDs. To change the (previous) Read access for SAM.DOE to Write access enter this: ALTSECT FILEA.XX.DESIGN;REPPAIR(W:SAM.DOE) To assign Read and Write access to SAM.DOE, do this: ALTSEC FILEA.XX.DESIGN;REPPAIR(W,R:SAM.DOE) Deleting ACDs. ------------------------------------------------------------------------------------------- | | | Command Intrinsic Purpose | | | ------------------------------------------------------------------------------------------- | | | ALTSEC To delete an ACD | | | | HPACDPUT To delete an ACD | | | ------------------------------------------------------------------------------------------- To remove @.DESIGN from the ACD attributes of FILEA, enter this: ALTSEC FILEA.XX.DESIGN;DELPAIR(NONE:@.DESIGN) To deny OPERATOR.SYS any access to LDEV 7, enter this: ALTSEC 7,LDEV;DELPAIR=(R,W:OPERATOR.SYS) Only an owner can delete an ACD associated with a file. Only the system manager can delete an ACD associated with a device.. Migrating ACDs. Device ACDs should not be migrated, because they are tied to their system's configuration. You can move file ACDs between MPE V/E and MPE/iX by using the STORE and RESTORE commands, where COPYACD is the default. These are the steps CM RESTORE takes during forward migration: 1. reads the MPE V/E store format. 2. calls a routine to convert it to MPE/iX internal format. 3. calls the file label extension write routine, which puts the ACD into effect. These are the steps CM STORE takes during backward migration: 1. reads the ACD from the security file label extension. 2. calls a routine to convert it into MPE V/E format. 3. writes it out to the STORE tape. Be aware that MPE/iX allows more user-mode pairs than MPE V/E does. You must have authorization to use the ;COPYACD parameter of the STORE and RESTORE commands. If you are not an owner of the file or do not have RACD permission, you get an error. The STORE command checks the ACD on disk for permission. RESTORE checks the ACD from the tape. For more details, refer to the MPE/iX Commands Reference Manual (32650-90003) and the MPE/iX Intrinsics Reference Manual (32650-90028). Logging system events [REV BEG] The following list shows the types of logs that you can request. SYSGEN System Logging System Log Events Event Type System logging enabled 100 System up record 101 Job initiation record 102 Job termination record 103 Process termination record 104 File close record 105 System shutdown record 106 Power failure record 107 Spooling log record 108 I/O error record 111 Physical mount/dismount 112 Logical mount/dismount 113 Tape labels record 114 Console log record 115 Program file event 116 New commercial spooling 120 Architected interface 130 Password changes 134 System logging configuration 135 Restore logging 136 Printer access failure 137 ACD changes 138 Stream initiation logging 139 User logging 140 Process creation 141 Chgroup record 143 File open record 144 Maintenance request log 146 Diagnostic information record 150 High priority machine check 152 Low priority machine check 152 CM file close record 160 All log information is kept in records. Each record begins with a standard header and ends with identification information. The information between is different for each log type. The LOGTOOL utility has a standard format to display information. Log of system logging configuration. This log gives you an audit trail of changes to the logging configuration. This log is initially enabled (ON). The following is the log record format: Type 135 Record Format --------------------------------------------------------------------------------------------- | Length, | Record Content | | in 16-bit | | | words | | --------------------------------------------------------------------------------------------- - 1 - Record type (135) - --------------------------------------------------------------------------------------------- - 1 - Record length - --------------------------------------------------------------------------------------------- - 1 - Process identification number - --------------------------------------------------------------------------------------------- - 3 - Time stamp - --------------------------------------------------------------------------------------------- - 2 - Job type/job number - --------------------------------------------------------------------------------------------- - 1 - (Reserved) - --------------------------------------------------------------------------------------------- - 1 - LDEV number - --------------------------------------------------------------------------------------------- - 4 - System logging masking words - --------------------------------------------------------------------------------------------- - 8 - User name - --------------------------------------------------------------------------------------------- - 8 - Group name - --------------------------------------------------------------------------------------------- - 8 - Account name - --------------------------------------------------------------------------------------------- - 8 - job or session name - --------------------------------------------------------------------------------------------- Log of restore. This log traces file restorations. Files can be restored from tape or serial disk to the system. This log type is initially disabled (OFF). It can be enabled by SYSGEN followed by a START command. The following is the log record format: Type 136 Record Format --------------------------------------------------------------------------------------------- | Length, | Record Content | | in 16-bit | | | words | | --------------------------------------------------------------------------------------------- - 1 - Record type (136) - --------------------------------------------------------------------------------------------- - 1 - Record length - --------------------------------------------------------------------------------------------- - 1 - Process identification number - --------------------------------------------------------------------------------------------- - 3 - Time stamp - --------------------------------------------------------------------------------------------- - 2 - Job type/job number - --------------------------------------------------------------------------------------------- - 8 - File name - --------------------------------------------------------------------------------------------- - 8 - File group - --------------------------------------------------------------------------------------------- - 8 - File account - --------------------------------------------------------------------------------------------- - 8 - Creator - --------------------------------------------------------------------------------------------- - 17 - Volume identification - --------------------------------------------------------------------------------------------- - 1 - Access type - --------------------------------------------------------------------------------------------- - 8 - User name - --------------------------------------------------------------------------------------------- - 8 - Group name - --------------------------------------------------------------------------------------------- - 8 - Account name - --------------------------------------------------------------------------------------------- - 8 - job or session name - --------------------------------------------------------------------------------------------- Log of printer access failure. This log keeps track of failed attempts attaching spool files to printers. New spool files, which are logged by FOPEN as event #144, are not logged here. This log is initially disabled, but can be enabled by SYSGEN followed by a START command. Type 137 Record --------------------------------------------------------------------------------------------- | Length, | Record Content | | in 16-bit | | | words | | --------------------------------------------------------------------------------------------- - 1 - record type (137) - --------------------------------------------------------------------------------------------- - 1 - record length - --------------------------------------------------------------------------------------------- - 1 - process identification number - --------------------------------------------------------------------------------------------- - 3 - time stamp - --------------------------------------------------------------------------------------------- - 2 - job type/job number - --------------------------------------------------------------------------------------------- - 2 - creator job number - --------------------------------------------------------------------------------------------- - 8 - creator job name - --------------------------------------------------------------------------------------------- - 8 - creator user name - --------------------------------------------------------------------------------------------- - 8 - creator account name - --------------------------------------------------------------------------------------------- - 25 - spool file name - --------------------------------------------------------------------------------------------- - 8 - target device name/class - --------------------------------------------------------------------------------------------- - 1 - (reserved) - --------------------------------------------------------------------------------------------- - 2 - file size - --------------------------------------------------------------------------------------------- - 1 - status - --------------------------------------------------------------------------------------------- - 8 - user name - --------------------------------------------------------------------------------------------- - 8 - group name - --------------------------------------------------------------------------------------------- - 8 - account name - --------------------------------------------------------------------------------------------- - 8 - job or session name - --------------------------------------------------------------------------------------------- Log of stream initiation. This log records the name of a streamed job, its number, the user that initiates it (and the logon), and the scheduled date and time. This log is initially disabled, but can be enabled by SYSGEN followed by a START command. Type 139 Record --------------------------------------------------------------------------------------------- | Length, | Record Content | | in 16-bit | | | words | | --------------------------------------------------------------------------------------------- - 1 - Record type (139) - --------------------------------------------------------------------------------------------- - 1 - record length - --------------------------------------------------------------------------------------------- - 1 - process identification number - --------------------------------------------------------------------------------------------- - 3 - time stamp - --------------------------------------------------------------------------------------------- - 2 - job type/job number - --------------------------------------------------------------------------------------------- - 1 - input LDEV - --------------------------------------------------------------------------------------------- - 25 - job file name - --------------------------------------------------------------------------------------------- - 2 - job logon job or session number - --------------------------------------------------------------------------------------------- - 8 - job logon user - --------------------------------------------------------------------------------------------- - 8 - job logon group - --------------------------------------------------------------------------------------------- - 8 - job logon account - --------------------------------------------------------------------------------------------- - 8 - job name - --------------------------------------------------------------------------------------------- - 2 - input spool file id - --------------------------------------------------------------------------------------------- - 1 - scheduled date - --------------------------------------------------------------------------------------------- - 2 - scheduled time - --------------------------------------------------------------------------------------------- - 8 - user name - --------------------------------------------------------------------------------------------- - 8 - group name - --------------------------------------------------------------------------------------------- - 8 - account name - --------------------------------------------------------------------------------------------- - 8 - job or session name - --------------------------------------------------------------------------------------------- Log of user logging. This log keeps a record of all OPENLOG and CLOSELOG intrinsic calls. The system manager can use it to see who accesses, or tries to access, the user logging facility. This log is initially disabled, but can be enabled by SYSGEN followed by a START command. Type 140 Record --------------------------------------------------------------------------------------------- | Length, | Record Content | | in 16-bit | | | words | | --------------------------------------------------------------------------------------------- - 1 - record type (140) - --------------------------------------------------------------------------------------------- - 1 - record length - --------------------------------------------------------------------------------------------- - 1 - process identification number - --------------------------------------------------------------------------------------------- - 3 - time stamp - --------------------------------------------------------------------------------------------- - 2 - job type/job number - --------------------------------------------------------------------------------------------- - 25 - program file name - --------------------------------------------------------------------------------------------- - 4 - intrinsic - --------------------------------------------------------------------------------------------- - 2 - index - --------------------------------------------------------------------------------------------- - 4 - log id - --------------------------------------------------------------------------------------------- - 1 - mode - --------------------------------------------------------------------------------------------- - 1 - status - --------------------------------------------------------------------------------------------- - 8 - user name - --------------------------------------------------------------------------------------------- - 8 - group name - --------------------------------------------------------------------------------------------- - 8 - account name - --------------------------------------------------------------------------------------------- - 8 - job or session name - --------------------------------------------------------------------------------------------- The LOG ID field in the log record is "XXXXXX" for CLOSELOG intrinsic when the index is bad. Log of process creation. You can use this log to record all process creations. This log is initially disabled, but can be enabled by SYSGEN followed by a START command. Type 141 Record --------------------------------------------------------------------------------------------- | length, in | Record Content | | 16-bit words | | --------------------------------------------------------------------------------------------- - 1 - record type (141) - --------------------------------------------------------------------------------------------- - 1 - record length - --------------------------------------------------------------------------------------------- - 1 - process identification number - --------------------------------------------------------------------------------------------- - 3 - time stamp - --------------------------------------------------------------------------------------------- - 2 - job type/job number - --------------------------------------------------------------------------------------------- - 25 - file name - --------------------------------------------------------------------------------------------- - 1 - (reserved) - --------------------------------------------------------------------------------------------- - 2 - priority - --------------------------------------------------------------------------------------------- - 2 - process space id - --------------------------------------------------------------------------------------------- - 4 - parent PID - --------------------------------------------------------------------------------------------- - 2 - NM_Heap_Size - --------------------------------------------------------------------------------------------- - 2 - capabilities mask* - --------------------------------------------------------------------------------------------- - 8 - (reserved) - --------------------------------------------------------------------------------------------- - 8 - user name - --------------------------------------------------------------------------------------------- - 8 - group name - --------------------------------------------------------------------------------------------- - 8 - account name - --------------------------------------------------------------------------------------------- - 8 - job or session name - --------------------------------------------------------------------------------------------- *The capabilities mask is read as follows: User File access Program/group bit capability bit capability bit capability 0 SM 6 CV 23 BA 1 AM 7 UV 24 IA 2 AL 8 LG 25 PM 3 GL 9 SP 28 MR 4 DI 10 PS 30 DS 5 OP 11 NA 31 PH 12 NM 13 CS 14 ND 15 SF Logging a specific user The LOGTOOL utility command LIST shows you the output of log records in a standard format. If you like, you can filter the output of LOGTOOL utility to show you information about only a specific user or users. The syntax for this is shown below. [;JSNAME=job or session_name] LIST {LOG=log_name}[;USER=user_name ][...] [;ACCOUNT=account_name ] The input for these commands should be no longer than 80 characters. Default for all parameters is the wildcard @. For example, to select log records from log files 1 through 5, with log information about password changes (log type 134), and user identification JTEST,MARIA.PAYROLL, you would enter the following. >LIST LOG=1/5;TYPE=134;JSNAME=JTEST;USER=MARIA;ACCOUNT=PAYROLL This selection option is valid for the log types listed below: 102, job initiation 103, job termination 104, process termination 105, file close (also 160) 108, spooling log 112, physical mount/dismount 113, logical mount/dismount 114, tape labels 115, console log 116, program file event 120, new commercial spooling 130, architecture interface 134, password change 135, system logging configuration 136, restore 137, printer access failure 138, ACD changes 139, stream initiation 140, user logging access 141, process initiation 143, change group 144, file open Logging file security related events MPE/iX permits logging of system and user events. The events that relate directly to file security are: * password changes (event type 134) * printer access failure (event type 137) * ACD changes (event type 138) Logging begins whenever the system is rebooted; however, not all events are automatically enabled. Some, including those listed above, are initially disabled. You can, however, request that a new file be started. To keep a certain type of log, the system operator or system manager must change its status to ON (configure it) in SYSDIAG. To see log records displayed, call the LOGTOOL utility from SYSGEN. For a discussion of these and other logging facilities, consult these topics in Performing System Operator Tasks (32650-90137): SYSDIAG, the LOGTOOL utility, and SYSGEN System Logging. Log of password changes. System logging records when a user, group, or account password is changed by an MPE/iX command or a utility program. This log is initially disabled (OFF). The information recorded in this logging includes * header * record type * record length * time stamp * job or session number * PIN * Log information * the identification of the user who changed a password: job or session name, user name, group name, and account name * the identification of a user whose password was changed: user name, group name, and account name whenever the affected password changes * input logical device number from which the password was changed * program file name from which password change was executed * type changed: 1 = user, 2 = group, 4 = account In this example, JOHN.PAYROLL,DOE, job or session name JREPORT, successfully changed the account password for PAYROLL through the command excutor. The change was made from LDEV 21. The LOGTOOL utility formats the following layout after the standard header: TARGET USER: TARGET GROUP: TARGET ACCOUNT: PAYROLL TYPE CHANGED: ACCOUNT LDEV: 21 EXECUTED FROM: CI.PUB.SYS USER: JOHN GROUP: DOE ACCOUNT: PAYROLL JSNAME: JREPORT The following is the log record format: Table 13-1. Type 134 Record Format --------------------------------------------------------------------------------------------- | Length, | Record Content | | in 16-bit | | | words | | --------------------------------------------------------------------------------------------- - 1 - record type (134) - --------------------------------------------------------------------------------------------- - 1 - record length - --------------------------------------------------------------------------------------------- - 1 - process identification number - --------------------------------------------------------------------------------------------- - 3 - time stamp - --------------------------------------------------------------------------------------------- - 2 - job type/job number - --------------------------------------------------------------------------------------------- - 8 - target user name - --------------------------------------------------------------------------------------------- - 8 - target group name - --------------------------------------------------------------------------------------------- - 8 - target account name - --------------------------------------------------------------------------------------------- - 1 - type changed - --------------------------------------------------------------------------------------------- - 1 - input LDEV number - --------------------------------------------------------------------------------------------- - 25 - executed from - --------------------------------------------------------------------------------------------- - 3 - (reserved) - --------------------------------------------------------------------------------------------- - 8 - user name - --------------------------------------------------------------------------------------------- - 8 - group name - --------------------------------------------------------------------------------------------- - 8 - account name - --------------------------------------------------------------------------------------------- - 8 - job or session name - ---------------------------------------------------------------------------------------------
NOTE The PASSWORD command, allows all users to change their own passwords. In the past, only system managers and account managers could change any passwords.
[REV END][REV BEG] Log of ACD changes. This log type is activated when ACDs are changed (created, deleted, copied, or modified) with MPE/iX commands or intrinsics. The log is initially disabled (OFF). The information recorded in this logging includes * header * record type * record length * time stamp * job or session number * PIN * log information * the identification of the user who changed the ACD: job or session name, user name, group name, and account name * the object type and object name whose ACD was changed * the object type and object name from which the ACD was copied * the type of change to the ACD: create, add pair, replace pair, copy, delete pair, delete * the program file name from which the ACD change was executed. * status returned (HPE status) In this example, user JOHN.PAYROLL,DOE, with job or session name JREPORT, successfully created an ACD for a file called FTEST.TESTGP.PAYROLL, using the command executor. The LOGTOOL formats the following layout after the standard header: TARGET OBJECT: FTEST.TESTGP.PAYROLL SOURCE OBJECT: FUNCTION: CREATE EXECUTED FROM: CI.PUB.SYS STATUS SUCCESSFUL USER JOHN GROUP: DOE ACCOUNT: PAYROLL JSNAME: JREPORT The following is the log record format: Table 13-2. Type 138 Record Format --------------------------------------------------------------------------------------------- | Length, | Record Content | | in 16-bit | | | words | | --------------------------------------------------------------------------------------------- - 1 - Record type (138) - --------------------------------------------------------------------------------------------- - 1 - Record length - --------------------------------------------------------------------------------------------- - 1 - Process identification number - --------------------------------------------------------------------------------------------- - 3 - Time stamp - --------------------------------------------------------------------------------------------- - 2 - Job type/job number - --------------------------------------------------------------------------------------------- - 25 - Target object name - --------------------------------------------------------------------------------------------- - 25 - Source object name - --------------------------------------------------------------------------------------------- - 4 - Function - --------------------------------------------------------------------------------------------- - 25 - Executed from - --------------------------------------------------------------------------------------------- - 2 - Status - --------------------------------------------------------------------------------------------- - 8 - User name - --------------------------------------------------------------------------------------------- - 8 - Group name - --------------------------------------------------------------------------------------------- - 8 - Account name - --------------------------------------------------------------------------------------------- - 8 - job or session name - --------------------------------------------------------------------------------------------- [REV END]


MPE/iX 5.0 Documentation