HP 3000 Manuals

Managing System Access With Logon Restrictions [ Manager's Guide to MPE/iX Security ] MPE/iX 5.0 Documentation


Manager's Guide to MPE/iX Security

Managing System Access With Logon Restrictions 

With one exception, the following procedures control system access by
placing limitations on users when they attempt to log on to the system.
The exception automatically logs an inactive session off the system.

Controlling Access With Logon UDCs 

Logon UDCs (a type of User Defined Command) can be used to confine the
system access capabilities of individual users within rigidly defined
limits.

A logon UDC is one that executes whenever a user logs on.  Each level in
the system can have a logon UDC that executes at that level.  System
Managers create and control system logon UDCs, Account Managers create
and control account logon UDCs, and users create and control their own
logon UDCs.  System and Account Managers also can control user UDCs.

You might use the system level logon UDC to prevent users from accessing
MPE/iX commands.  For example, a logon UDC with NOBREAK runs an
application program then automatically logs users off the system as soon
as they exit the program.  In this case, users have access only to the
application program, but not to the MPE/iX command interpreter or other
system facilities.

Creating a UDC 

To create a UDC, type the commands you wish to use in a text file, then
catalog the file with the :SETCATALOG command.  If a UDC is to be a logon
UDC, declare it as such when you create it.  Set the UDC level (system,
account, or user) at the time you catalog it.  The MPE/iX Commands 
Reference Manual (32033-90006) describes in detail how to create and
catalog UDCs.



MPE/iX 5.0 Documentation