HP 3000 Manuals

I : Configuring Security [ Information Access Server: Learning the Administrator Utility ] MPE/iX 5.0 Documentation


Information Access Server: Learning the Administrator Utility

I : Configuring Security 

You can define two kinds of security in Information Access Server:  user
passwords, and security that will limit access to tables or to items
within those tables.

Passwords assigned to users will protect access to the whole of Access
Server.  But once a PC user gains entry, the password itself will not
limit access to specific tables or items.  At this point, the tables you
created are public tables, accessible by anyone who can use Access
Server.

Configure security for the tables you defined by assigning the access
group MANAGERS to the two IMAGE tables, and the access group TUTORIAL to
the view table, as specified on Worksheet 2, Figure 2-3.  Here's what the
system will look like with this table security:

[]
Figure 2-11. Table Security Assigned ___________________________________________________________ | | | References in this Learning manual: | | Lesson 1:D, How the Data Dictionary is Configured| | Figure 2-3, Worksheet 2 Completed | | | | References in Information Access Server: Database | | Administration: | | Chapter 8, Configuring Security: | | Security Menu | | Table Security Menu | | Adding Table Security | | Item Security Menu | | Adding Item Security | ___________________________________________________________ Adding Table Security
[]
Go to screen ADTST --------------------------------------------------------------------------------------------- | | | | What You Do | What Happens | | | | --------------------------------------------------------------------------------------------- | | | | Go directly to the Add/Delete Table | | | Security by Table (ADTST) screen. | | | | | | I-1. Type ADTST in the Go to screen field | The Add/Delete Table Security by Table | | and press Enter. | screen appears. Here, you can assign one | | | or more access groups to a table. | | | | --------------------------------------------------------------------------------------------- | | | | First, configure security involving the | | | access group MANAGERS. | | | | | | I-2. Type PRODUCT-MASTER in the Table | The screen displays a list of all access | | field and press Enter. | groups. | | | | --------------------------------------------------------------------------------------------- | | | | I-3. Type an X next to the access group | The screen clears. You've just assigned | | MANAGERS and press Enter. | access group MANAGERS to the table | | | PRODUCT-MASTER. Only users in access group | | | MANAGERS will be able to access the table. | | | | | I-4. Repeat what you learned in Steps I-2 | You have defined who can access the table | | and I-3 to assign access group MANAGERS to | INVENTORY. | | the INVENTORY table. | | | | | | Remain at the Add/Delete Table Security by | | | Table menu. | | | | | --------------------------------------------------------------------------------------------- Table 2-0. (cont.) --------------------------------------------------------------------------------------------- | | | | What You Do | What Happens | | | | --------------------------------------------------------------------------------------------- | | | | Now configure security involving the access | | | group TUTORIAL. | | | | | | I-5. Type PRODUCTS in the Table field and | The screen clears. Only users in access | | press Enter. Then type an X next to | group TUTORIAL will be able to access the | | TUTORIAL and press Enter. | view table PRODUCTS. | | | | --------------------------------------------------------------------------------------------- | | | | I-5. Choose: | The Table Security Menu appears. | | | | | Done f8 | You have configured security that defines | | | which users will be able to access which | | | tables. | | | | | If you wanted to secure individual data | | | items in those tables by allowing only | | | specified access group(s) to see them, you | | | could do so by going to the Add Item | | | Security (AIS) screen. The process is very | | | similar to securing tables. | | | | | | Instead, stop configuring and return to the | | | Administrator Utility Main Menu. | | | | | | I-6. Type M in the Go to screen field and | The Administrator Utility Main Menu | | press Enter. | appears. | | | | --------------------------------------------------------------------------------------------- | | | | You can now stop configuring and take a | | | short break. | | | | | | I-7. Type Exit or E in the Go to screen | The screen clears and an END OF PROGRAM | | field, then press Enter. | message appears. MPE issues a prompt. You | | | have exited the Administrator Utility and | | | returned to MPE. | | | | --------------------------------------------------------------------------------------------- Summary In this exercise, you learned how to: * Secure tables by assigning access groups to them. * Exit the Administrator Utility.


MPE/iX 5.0 Documentation