User's Guide to MPE/iX Security MPE/iX 5.0 Documentation
User's Guide to MPE/iX Security
Table of Contents
User's Guide to MPE/iX Security
User's Guide to MPE/iX Security : COPYRIGHT NOTICE
Ch 1. Introduction
The User's Guide to MPE/iX Security
Physical Security
Procedural Security
System Security
Identification
Authentication
Authorization
Defining User Roles
The System Manager
The System Supervisor
The System Operator
The Account Manager
General Users
Security Policy
Components of the Account Structure
The Individual Account
Files
Standard Characteristics
Creating Naming Conventions
User Names
Group Names
File Names
Hierarchical file system (HFS)
HFS file names
HFS syntax
Ch 2. Accessing the System
Getting Started
To Log On
Guidelines for Selecting Passwords
Protecting Your System with Passwords
Changing Your Password
Ch 3. Protecting Your System with Access Control Definitions (ACDs)
Access Control Definitions (ACDs)
What is an ACD?
How do ACDs work
Access modes
User specifications
Required ACDs
HFS Object creation
HFS Object deletion
HFS File renaming
File owner
Appropriate Privilege
System manager capability
Account manager capability
Execute (X) Access
User Identification
SAVE access in MPE groups
CWD and File Security
ACD examples
Tasks Involving System Security
Listing ACDs
Listing ACDs for directories and files in directories
Changing access to HFS files and directories
Creating ACDs
Assigning ACDs
Adding an ACD Pair
Replacing an ACD Pair
Replacing ACDs
Modifying ACDs
Deleting ACDs
Deleting an ACD Pair
Deleting Optional ACDs
Copying ACDs
Copying ACD Pairs
Copying Files That Have ACDs
Ch 4. Protecting Your Files with Capabilities, File Access Restrictions and Lock
Ch 4. Protecting Your Files with Capabilities, File Access Restrictions and Lock
File System Security Features
Ch 4. Protecting Your Files with Capabilities, File Access Restrictions and Lock
File System Security Features
Capabilities
Ch 4. Protecting Your Files with Capabilities, File Access Restrictions and Lock
File System Security Features
Account, Group, and User Capabilities
Ch 4. Protecting Your Files with Capabilities, File Access Restrictions and Lock
File System Security Features
Listing Capabilities
Ch 4. Protecting Your Files with Capabilities, File Access Restrictions and Lock
File System Security Features
Listing Capabilities
Listing Account Capabilities
Ch 4. Protecting Your Files with Capabilities, File Access Restrictions and Lock
File System Security Features
Listing Group Capabilities
Ch 4. Protecting Your Files with Capabilities, File Access Restrictions and Lock
File System Security Features
Listing Group Capabilities
Listing User Capabilities
Capabilities Table
Account Librarian (AL)
Account Manager (AM)
Batch Access (BA)
Use Communications Software (CS)
Diagnostician (DI)
Extra Data Segments (DS)
Group Librarian (GL)
Interactive Access (IA)
Multiple RIN (MR)
Network Administrator (NA)
Node Manager (NM)
Use Nonshareable Devices (ND)
Use Mountable Volume Sets (UV)
Privileged Mode (PM)
Process Handling (PH)
Programmatic Sessions (PS)
Save User Files Permanently (SF)
System Manager (SM)
System Supervisor (OP)
Use User Logging Facility (LG)
Create Mountable Volume Sets (CV)
Restricting File Access
Access Modes
User Types
Specifying File Access Restrictions
Account-Level File Security
Group-Level Security
File-Level Security
Default File Access Restrictions
Lockwords
Releasing and Securing File Security
Summary
Ap A. Error Messages
General Error Messages
General Error Messages (contd)
ACD Related Error Messages
INDEX
Index
MPE/iX 5.0 Documentation