HP Security Monitor/iX User's Guide MPE/iX 5.0 Documentation
HP Security Monitor/iX User's Guide
Table of Contents
HP Security Monitor/iX User's Guide
HP Security Monitor/iX User's Guide : COPYRIGHT NOTICE
Ch 1. Introduction
The HP Security Monitor/iX User's Guide
Physical Security
Procedural Security
System Security
Identification
Authentication
Authorization
Defining User Roles
The System Manager
The System Supervisor
The System Operator
The Account Manager
General Users
Security Policy
Components of the Account Structure
The Individual Account
Files
Standard Characteristics
Creating Naming Conventions
User Names
Group Names
File Names
Hierarchical file system (HFS)
HFS file names
HFS syntax
Ch 2. Accessing the System
Getting Started
To Log On
Guidelines for Selecting Passwords
Protecting Your System with Passwords
Changing Your Password
If Your Password Expires
Discussion
Effects of Expired User Passwords
Password Encryption
Discussion
Minimum Password Lengths
Mandatory Password Prompts
Discussion
Controlling System Access with Logon Restrictions
Terminating Sessions on Initial UDC Failure
Limiting the Number of Logon Attempts
Providing Minimal Logon Assistance
Dealing with Embedded Passwords in Remote Logons
Passwords in Batch Submissions
Embedded Passwords in Job Files
Restricting Job Cross Streaming
The Cross Streaming Authorization Option
Eliminating Password Exposure with the Stream Privilege Option
Stream Privilege Option Features
Stream privilege can be granted at two levels:
Recommendation:
Ch 3. Protecting Your System with Access Control Definitions (ACDs)
Access Control Definitions (ACDs)
What is an ACD?
How do ACDs work
Access modes
User specifications
Required ACDs
HFS Object creation
HFS Object deletion
HFS File renaming
File owner
Appropriate Privilege
System manager capability
Account manager capability
Execute (X) Access
User Identification
SAVE access in MPE groups
CWD and File Security
The Maximum File Protection Option
ACD examples
Tasks Involving System Security
Listing ACDs
Listing ACDs for directories and files in directories
Changing access to HFS files and directories
Creating ACDs
Assigning ACDs
Adding an ACD Pair
Replacing an ACD Pair
Replacing ACDs
Modifying ACDs
Deleting ACDs
Deleting an ACD Pair
Deleting Optional ACDs
Copying ACDs
Copying ACD Pairs
Copying Files That Have ACDs
Ch 4. Protecting Your Files with Capabilities, File Access Restrictions and Lock
Ch 4. Protecting Your Files with Capabilities, File Access Restrictions and Lock
File System Security Features
Ch 4. Protecting Your Files with Capabilities, File Access Restrictions and Lock
File System Security Features
Capabilities
Ch 4. Protecting Your Files with Capabilities, File Access Restrictions and Lock
File System Security Features
Account, Group, and User Capabilities
Ch 4. Protecting Your Files with Capabilities, File Access Restrictions and Lock
File System Security Features
Listing Capabilities
Ch 4. Protecting Your Files with Capabilities, File Access Restrictions and Lock
File System Security Features
Listing Capabilities
Listing Account Capabilities
Ch 4. Protecting Your Files with Capabilities, File Access Restrictions and Lock
File System Security Features
Listing Group Capabilities
Ch 4. Protecting Your Files with Capabilities, File Access Restrictions and Lock
File System Security Features
Listing Group Capabilities
Listing User Capabilities
Capabilities Table
Account Librarian (AL)
Account Manager (AM)
Batch Access (BA)
Use Communications Software (CS)
Diagnostician (DI)
Extra Data Segments (DS)
Group Librarian (GL)
Interactive Access (IA)
Multiple RIN (MR)
Network Administrator (NA)
Node Manager (NM)
Use Nonshareable Devices (ND)
Use Mountable Volume Sets (UV)
Privileged Mode (PM)
Process Handling (PH)
Programmatic Sessions (PS)
Save User Files Permanently (SF)
System Manager (SM)
System Supervisor (OP)
Use User Logging Facility (LG)
Create Mountable Volume Sets (CV)
Restricting File Access
Access Modes
User Types
Specifying File Access Restrictions
Account-Level File Security
Group-Level Security
File-Level Security
Default File Access Restrictions
Lockwords
Releasing and Securing File Security
Summary
Ap A. Error Messages
General Error Messages
General Error Messages (contd)
ACD Related Error Messages
INDEX
Index
MPE/iX 5.0 Documentation