HP 3000 Manuals

HP Security Monitor/iX User's Guide MPE/iX 5.0 Documentation


HP Security Monitor/iX User's Guide

Table of Contents

 HP Security Monitor/iX User's Guide
   HP Security Monitor/iX User's Guide : COPYRIGHT NOTICE

   Ch 1.  Introduction
       The HP Security Monitor/iX User's Guide
      Physical Security
      Procedural Security
      System Security
          Identification
          Authentication
          Authorization
          Defining User Roles
          The System Manager
          The System Supervisor
          The System Operator
          The Account Manager
          General Users
      Security Policy
      Components of the Account Structure
          The Individual Account
          Files
          Standard Characteristics
          Creating Naming Conventions
          User Names
          Group Names
          File Names
      Hierarchical file system (HFS)
          HFS file names
          HFS syntax

   Ch 2.  Accessing the System
       Getting Started
          To Log On
      Guidelines for Selecting Passwords
      Protecting Your System with Passwords
      Changing Your Password
      If Your Password Expires
          Discussion
          Effects of Expired User Passwords
      Password Encryption
          Discussion
      Minimum Password Lengths
      Mandatory Password Prompts
          Discussion
      Controlling System Access with Logon Restrictions
          Terminating Sessions on Initial UDC Failure
          Limiting the Number of Logon Attempts
          Providing Minimal Logon Assistance
      Dealing with Embedded Passwords in Remote Logons
      Passwords in Batch Submissions
          Embedded Passwords in Job Files
      Restricting Job Cross Streaming
          The Cross Streaming Authorization Option
      Eliminating Password Exposure with the Stream Privilege Option
          Stream Privilege Option Features
             Stream privilege can be granted at two levels:
                Recommendation:

   Ch 3.  Protecting Your System with Access Control Definitions (ACDs)
       Access Control Definitions (ACDs)
          What is an ACD?
          How do ACDs work
          Access modes
          User specifications
          Required ACDs
          HFS Object creation
          HFS Object deletion
          HFS File renaming
          File owner
      Appropriate Privilege
          System manager capability
          Account manager capability
      Execute (X) Access
      User Identification
          SAVE access in MPE groups
          CWD and File Security
      The Maximum File Protection Option
      ACD examples
      Tasks Involving System Security
          Listing ACDs
          Listing ACDs for directories and files in directories
          Changing access to HFS files and directories
          Creating ACDs
          Assigning ACDs
          Adding an ACD Pair
          Replacing an ACD Pair
          Replacing ACDs
          Modifying ACDs
          Deleting ACDs
             Deleting an ACD Pair
             Deleting Optional ACDs
          Copying ACDs
             Copying ACD Pairs
          Copying Files That Have ACDs

   Ch 4.  Protecting Your Files with Capabilities, File Access Restrictions and Lock
    Ch 4.  Protecting Your Files with Capabilities, File Access Restrictions and Lock
       File System Security Features
    Ch 4.  Protecting Your Files with Capabilities, File Access Restrictions and Lock
       File System Security Features
          Capabilities
    Ch 4.  Protecting Your Files with Capabilities, File Access Restrictions and Lock
       File System Security Features
          Account, Group, and User Capabilities
    Ch 4.  Protecting Your Files with Capabilities, File Access Restrictions and Lock
       File System Security Features
          Listing Capabilities
    Ch 4.  Protecting Your Files with Capabilities, File Access Restrictions and Lock
       File System Security Features
          Listing Capabilities
             Listing Account Capabilities
    Ch 4.  Protecting Your Files with Capabilities, File Access Restrictions and Lock
       File System Security Features
          Listing Group Capabilities
    Ch 4.  Protecting Your Files with Capabilities, File Access Restrictions and Lock
       File System Security Features
          Listing Group Capabilities
             Listing User Capabilities
      Capabilities Table
          Account Librarian (AL)
          Account Manager (AM)
          Batch Access (BA)
          Use Communications Software (CS)
          Diagnostician (DI)
          Extra Data Segments (DS)
          Group Librarian (GL)
          Interactive Access (IA)
          Multiple RIN (MR)
          Network Administrator (NA)
          Node Manager (NM)
          Use Nonshareable Devices (ND)
          Use Mountable Volume Sets (UV)
          Privileged Mode (PM)
          Process Handling (PH)
          Programmatic Sessions (PS)
          Save User Files Permanently (SF)
          System Manager (SM)
          System Supervisor (OP)
          Use User Logging Facility (LG)
          Create Mountable Volume Sets (CV)
      Restricting File Access
          Access Modes
          User Types
          Specifying File Access Restrictions
             Account-Level File Security
             Group-Level Security
             File-Level Security
             Default File Access Restrictions
      Lockwords
      Releasing and Securing File Security
          Summary

   Ap A. Error Messages
       General Error Messages
      General Error Messages (contd)
      ACD Related Error Messages
   INDEX
       Index



MPE/iX 5.0 Documentation