HP 3000 Manuals

Information Access Server: Planning and Configuring : COPYRIGHT NOTICE [ Information Access Server: Planning and Configuring ] MPE/iX 5.0 Documentation


Information Access Server: Planning and Configuring


Information Access Server: Planning and Configuring Printed in U.S.A. HP Part No. B1716-90024 Edition Third Edition E0290
(c) 1987, 1988, 1990 by HEWLETT-PACKARD COMPANY Printed 19900201 Notice The information contained in this document is subject to change without notice. HEWLETT-PACKARD PROVIDES THIS MATERIAL "AS IS" AND MAKES NO WARRANTY OF ANY KIND, EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. HEWLETT-PACKARD SHALL NOT BE LIABLE FOR ERRORS CONTAINED HEREIN OR FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE OR USE OF THIS MATERIAL WHETHER BASED ON WARRANTY, CONTRACT, OR OTHER LEGAL THEORY. Hewlett-Packard assumes no responsibility for the use or reliability of its software on equipment that is not furnished by Hewlett-Packard. This document contains proprietary information which is protected by copyright. All rights are reserved. No part of this document may be photocopied, reproduced or translated to another language without the prior written consent of Hewlett-Packard Company. ________________________________________________________________________ Company or product names followed by (R) are U.S. registered trademarks of the respective company. Company or product names followed by (TM) are registered trademarks of the respective company. Lotus 1-2-3(R), Symhpony(R), and VisiCalc(R) are U.S. registered trademarks of Lotus Development Corporation. Omnidex(TM), and IMSAM(TM) are U.S. trademarks of Dynamic Information Systems Corporation. CONDOR(TM) is a U.S. trademark of Condor Computer Corporation. dBASE II(R), dBASEIII(R), and dBASE IV(R), are U.S. registered trademarks of Ashton-Tate Corp. IBM(R), PC(TM), XT(TM), AT(TM), PC-DOS(R), and DisplayWrite 3 are trademarks of International Business Machines Corp. MS-DOS(R), Microsoft(R), and Multiplan(R) are U.S. registered trademarks of Microsoft Corporation. Data Management Systems Division 8010 Foothills Boulevard Roseville, CA 95678, U.S.A. Printing History New editions are complete revisions of a manual. Update packages are issued between editions. They contain additional and replacement pages to be merged into the manual by the customer. The following print dates are in effect for this manual: Printed in: ________________________________________________________________________ First Edition, April, 1987 .............................. U.S.A. Second Edition, June, 1988 ................................... . Third Edition, February, 1990 ................................ . Conventions Convention Description This symbol represents a labeled key on the keyboard. For example, Shift is the shift key, Y is the Y key, etc. Exceptions Keyboard Instructions: The Enter and Return keys discussed in our procedures and examples specifically refer to the Enter and Return keys on a terminal. If you are using an HP Vectra, IBM, Compaq, or IBM-compatible personal computer with a terminal emulator, use the keys that are the equivalent of Enter and Return. Function Label f1 Function Labels correspond to function keys labeled f1 through f8 on the keyboard. If your keyboard has another set of keys labeled f1 through f10, these keys will not work for utilities on the HP 3000. To choose a Function Press the corresponding function key on your keyboard. Label... Although PC users can choose function labels using HP Touch or a mouse, these input devices are not active for utilities on the HP 3000. SCREEN TEXT Screen text represents text, examples, or syntax statements displayed on the screen. Examples and syntax statements may include a program prompt, COMMANDS, ELEMENTS, variables, symbols, and punctuation. For example: :HELLO username.accountname :FILE T;DEV=TAPE;DEN=1600 :STORE filename.group.account;*T;SHOW Table Front-0. (cont.) Convention Description COMMANDS and are displayed in UPPERCASE to indicate that ELEMENTS they are to be typed as shown. variables represent parameters you MUST replace with appropriate information. ``;,". punctuation are typed as shown except for {} braces and and [] brackets which are used to indicate *!@= symbols alternates and options. {ALTERNAMES} are COMMANDS, ELEMENTS, or variables within {braces}. At least one is required. { ALTERNATE A} Type A or B { ALTERNATE B} [OPTIONS] are commands, elements, or variables within [brackets]. All are optional. [ OPTION A] Type A, B, or neither [ OPTION B] SCREEN HIGHLIGHT Represents highlighted text or data entry fields on the screen. _______________________________________ | | | | | Screen Title | | Instructions | | | | Field data entry | | | | | | | _______________________________________ This screen image represents your workstation screen. Our example includes a Screen Title displayed on the top banner line. This may be followed by a single line of Instructions. Within the body of the screen we have an example of a Field name and an associated data entry field where you would type in your data. Function labels along the bottom of the screen display operations you can perform, or provide assistance. Before You Begin Information Access in Brief Information Access is a component of HP NewWave Office. It consists of Information Access Server, Information Access SQL/XL, Information Access SQL/UX, and Information Access PC. Information Access allows users on PC workstations to access information resident on HP 3000 and HP 9000 computers, depending on which server is used, as well as to access PC-resident databases. * Information Access Server is the HP 3000-based data server running on MPE/V and MPE/XL. * Information Access SQL/XL is the HP 3000-based SQL server running only on MPE/XL. * Information Access SQL/UX is the HP 9000-based SQL server running on HP-UX. * Information Access PC is the PC-based software with which users retrieve, manipulate, and save information, locally or on the HP 3000 or HP 9000.
NOTE For U-based (and later) MITs, Information Access Server works with TurboIMAGE/3000 on the host HP 3000. Remote databases accessed by Information Access Server can be either IMAGE/3000 or TurboIMAGE/3000 databases. Throughout this manual, the term IMAGE is used as a shorthand term for IMAGE/3000 and TurboIMAGE/3000. Access PC and Access Server are used as shorthand terms for Information Access PC and Information Access Server, respectively.
Who Should Read This Manual This manual is used to plan and configure Information Access Server. If you are a primary or secondary Database Administrator (DBA) or someone working in that capacity, you'll be doing the planning and configuring of Information Access Server. Certain phases of the configuration process are only available to primary DBAs. These phases are marked "Primary DBA only." Some instructions may require that you consult with your System Manager. We assume that both primary and secondary DBAs have an understanding or working knowledge of: * Database administration concepts and practices * Programming in commercial applications * PCs and their applications * HP 3000 * IMAGE databases * Data file structure * Dictionary/3000 (optional) Primary and Secondary DBA Capabilities Information Access allows more than one DBA to run the Administrator Utility. However, only the primary DBA can perform all the Administrator functions or have unlimited access to all data in the Information Access data dictionary. The primary DBA has complete control of the Administrator Utility and its functions and can delegate certain responsibilities to one or more secondary DBAs. The primary DBA has control of all the tables within Information Access, regardless of who configured them or who controls the data source. A secondary DBA has control over only those access groups, users, tables, and data sources that were configured by him or her or that have been transferred from another DBA. The primary DBA is preconfigured in the data dictionary with the user name ADMIN, which cannot be changed or deleted. The password for ADMIN can be changed or modified at any time. See "Securing the Administrator Utility," later in this chapter. Secondary DBAs are designated by the primary DBA at the Add User screen in the Administrator Utility. See "Phase J, Configuring Users" in Chapter 2 of this manual. Primary DBA Capabilities * Has full Administrator Utility capabilities * Has unlimited access to data dictionary * Configures tables from all data sources * Configures users and access groups * Defines certain users as secondary DBAs * Has override power over secondary DBAs * Configures remote systems * Controls entries in the data dictionary that are not controlled by a secondary DBA * Can synchronize any table in the data dictionary * Can produce reports showing entire system configuration Secondary DBA Capabilities * Controls data sources either configured by self or transferred from another DBA * Configures tables from data sources they control * Configures table and item security for tables they control * Configures access groups and users * Can transfer control of a data source to another DBA * Can synchronize tables they control * Can produce reports showing portions of the system configuration that they control Rules for DBAs * The controller of an IMAGE or file table must control the data source from which the table is configured. * To control view tables, a secondary DBA must control all of the tables from which the view table is configured. * View tables created from tables that are controlled by more than one DBA can only be configured and controlled by the primary DBA. * Data sources and tables can be changed, deleted, or displayed by the primary DBA or the controlling secondary DBA. * Secondary DBAs can configure users but cannot define a user as a secondary DBA. For descriptions of how the primary DBA and secondary DBAs perform specific Administrator Utility functions, see the appropriate chapters in the Information Access Server: Database Administration manual. Setting Up Planning and configuring are two important stages in the five-stage process of setting up Access Server. Figure 1 shows where you'll find the written instructions and reference material for each stage.
[]
Figure 1. Setting Up Access Server: Five Stages Here is a summary of what you will be doing to set up Access Server. Read through these stages. Then carry each one out, in order, by referring to the manual and chapter listed. 1. Installing Access Server. If Access Server is being installed on the HP 3000 by HP NewWave Office System Services, the installation is performed by an HP Systems Engineer (SE). If Access Server is being installed on the HP 3000 as a standalone system, the installation is performed by the System Manager. As part of the installation, the AUTOINSTL program streams a job that builds and initializes (for a first-time installation) or restructures (for an update to a new release) the Information Access data dictionary. * If this is an initial installation, the SE or System Manager is encouraged to accept the defaults which come with the product. Later, once you've learned the tutorial in the Information Access Server: Learning the Administrator Utility manual, you'll be in a position to decide whether the data dictionary needs to be adjusted (see the next stage). * If this installation updates a previous version of the product, you or your System Manager (or SE) can adjust dataset capacities and data dictionary passwords during installation. For the installation steps, see Chapter 3 of the Information Access Server: System Management manual. Securing the Administrator Utility. After the product is installed, we recommend that you secure the Administrator Utility by following the instructions in "Securing the Administrator Utility," later in this chapter. 2. Learning the Administrator Utility. If you are new to the product, use the DBA tutorial part of the Information Access Server: Learning the Administrator Utility manual. It will teach you how to use the Administrator Utility to configure databases, files, tables, access groups, users, and data security. Even if you have used the product before, you may find it useful to redo the tutorial or to read through it for new information. After you do the tutorial, we suggest reading Chapters 1 and 2 of the Information Access Server: Database Administration manual. These chapters will provide a detailed overview of the configuration process. When you've finished, return to this manual and use the information in Chapters 1 and 2 to plan your system, modify the installation if necessary, and configure Access Server to suit your needs. 3. Planning Your Configuration. In this stage, you use the worksheets in this manual to gather information about PC users' data needs. Once the information is gathered, you need to analyze it to see if the default capacity of any of the datasets in the data dictionary should be adjusted. Then you and the System Manager decide on the allocation of system resources for Access Server, such as the disc space that can be used for saved tables. For a discussion of the planning process, see Chapter 1 of this manual. 4. Adjusting the data dictionary, if necessary. Once you've determined what needs to be configured, you'll know whether you need to raise or lower the default capacities of any of the datasets in the data dictionary. Changes can also be made, if you like, to the database passwords in the schema files for HDPDIC and HDPENV, the two IMAGE databases that comprise the data dictionary. For instructions on how to modify the data dictionary, see the beginning of Chapter 2. If necessary, you can consult Appendix A in the Information Access Server: Database Administration manual for the structure, size, rules, and schemas for the HDPDIC and HDPENV databases. 5. Configuring Access Server. In this stage, you take the completed worksheets and use the Administrator Utility to configure Access Server. Configuration involves adding entries to the data dictionary that define remote systems (if any), data sources, tables, access groups, users, and table and item security. If you have Dictionary/3000, you may want to use the Translator Utility to take information from Dictionary/3000 data dictionaries and add the corresponding IMAGE database and IMAGE table definitions to the Information Access data dictionary. For the configuration steps, see Chapter 2 of this manual. More detailed information on configuration can be found in the Information Access Server: Database Administration manual. Securing the Administrator Utility (Primary DBA Only) After Access Server has been installed, there are four security measures you (the primary DBA) should take before beginning the configuration process or learning the tutorial in the Information Access Server: Learning the Administrator Utility manual. You should make Access Server unavailable to users, give the program file ADMIN a lockword, give the primary DBA a password, and give the user OPERATOR a password. The instructions on the following pages guide you through this process. Making Access Server Unavailable --------------------------------------------------------------------------------------------- | | | | What You Do | What Happens | | | | --------------------------------------------------------------------------------------------- | | | | After installation, Access Server is | All users are prevented from using Access | | available for use to users. Before making | Server until you use the UDC command | | configuration changes, you should make it | ENABLEAC (or run the same program with | | unavailable to other users. | PARM=1). | | | | | 1. Use the UDC command DISABLEAC, or type | Any currently active users are terminated. | | RUN ADMIN.PPC.SYS;PARM=2; INFO="ADMIN" and | | | press Return. | | | | | --------------------------------------------------------------------------------------------- Giving File ADMIN a Lockword --------------------------------------------------------------------------------------------- | | | | What You Do | What Happens | | | | --------------------------------------------------------------------------------------------- | | | | At this point, we recommend protecting the | | | program file ADMIN by giving it a lockword. | | | This will prevent anyone who doesn't know | | | the lockword from running the Administrator | | | Utility or turning Access Server on and | | | off. | | | | | | 2. If you're not already logged on to the | You're logged on to PPC.SYS. | | group and account PPC.SYS, type HELLO | | | MANAGER.SYS,PPC at the MPE prompt and press | | | Return. Provide passwords for user, group, | | | and account, as required. | | | | | --------------------------------------------------------------------------------------------- | | | | 3. At the MPE prompt, type RENAME | The program file ADMIN now has the lockword | | ADMIN,ADMIN/lockword (where lockword is the | you've given it. Anyone running ADMIN will | | lockword you want the file to have), then | be prompted for the lockword before the | | press Return. | request to run is granted. | | | | --------------------------------------------------------------------------------------------- Giving the Primary DBA a Password --------------------------------------------------------------------------------------------- | | | | What You Do | What Happens | | | | --------------------------------------------------------------------------------------------- | | | | When Access Server is first installed, the | | | primary DBA is defined as user ADMIN with a | | | password that is a string of spaces. So | | | the next thing you should do is to enter | | | the Administrator Utility and give yourself | | | (user ADMIN) a password. Thereafter, | | | anyone will need to provide a password to | | | get beyond the Entry screen for the | | | Administrator Utility or the Translator | | | Utility. | | | | | | Secondary DBAs can be given passwords when | | | they are configured as users and given DBA | | | capability. See "Phase J" in Chapter 2. | | | | | | Once secondary DBAs have been defined, they | | | use their own user name and password to | | | access the two utilities. | | | | | --------------------------------------------------------------------------------------------- | | | | 4. Run the Administrator Utility, either | The Entry screen appears. | | by using the UDC command ADMIN, or by | | | typing RUN ADMIN.PPC.SYS and pressing | | | Return. | | | | | | If you've added a lockword to the file, | | | you'll be prompted for it. Type it in and | | | press Return. | | | | | --------------------------------------------------------------------------------------------- | | | | 5. Type ADMIN in the User field and press | The Administrator Utility Main Menu | | Enter. | appears. | | | | --------------------------------------------------------------------------------------------- | | | | You enter a password for user ADMIN at the | | | Change User screen. Go there in three | | | steps: | | | | | | 6. Choose Config f1. | The Configuration Main Menu appears. | | | | | Choose Users f4. | The User Menu appears. | | | | | Choose Change User f2. | The Change User screen appears. | | | | --------------------------------------------------------------------------------------------- | | | | 7. Type ADMIN in the User field and press | The Change User screen displays the current | | Enter. | user definition for the user ADMIN. | | | | --------------------------------------------------------------------------------------------- Table Front-0. (cont.) --------------------------------------------------------------------------------------------- | | | | What You Do | What Happens | | | | --------------------------------------------------------------------------------------------- | | | | 8. Type a password in the User Password | | | field. | | | | | | The password must begin with an alphabetic | | | character, followed by alphanumeric | | | characters and/or hyphens in any | | | combination. | | | | | | Upper and lower case are significant in the | | | password. | | | | | | Press Enter. | The requested change is made in the data | | | dictionary. | | | | | Once you have a password as the primary | | | DBA, you or your System Manager can modify | | | the commands ENABLEAC and DISABLEAC in the | | | UDC file (ACUDC.PPCUTIL.HPOFFICE) to | | | include ;INFO="ADMIN/password" if you want. | | | If you don't want to include the password | | | in the UDCs, you will be prompted for them | | | when you run the Administrator Utility. | | | | | - - | | | | 9. If you want to change the configuration | | | for OPERATOR, go on to 10. If not, go to | | | 14. | | | | | --------------------------------------------------------------------------------------------- Giving User OPERATOR a New Password --------------------------------------------------------------------------------------------- | | | | What You Do | What Happens | | | | --------------------------------------------------------------------------------------------- | | | | When Access Server is first installed, the | | | user OPERATOR's password is OPERATOR. This | | | allows a system operator to enable or | | | disable the system, but not to gain access | | | to Access Server. After the initial | | | startup, you can change the password for | | | OPERATOR. Thereafter, anyone other than a | | | primary DBA will need to provide this | | | password to enable or disable the system. | | | | | | 10. Type OPERATOR in the User field and | The Administrator Utility Main Menu | | press Enter. | appears. | | | | --------------------------------------------------------------------------------------------- | | | | You enter a password for user OPERATOR at | | | the Change User screen. Go there in three | | | steps: | | | | | | 11. Choose Config f1. | The Configuration Main Menu appears. | | | | | Choose Users f4. | The User Menu appears. | | | | | Choose Change User f2. | The Change User screen appears. | | | | --------------------------------------------------------------------------------------------- | | | | 12. Type OPERATOR in the User field and | The Change User screen displays the current | | press Enter. | user definition for the user OPERATOR. | | | | --------------------------------------------------------------------------------------------- | | | | 13. Type a password in the User Password | | | field. | | | | | | The password must begin with an alphabetic | | | character, followed by alphanumeric | | | characters and/or hyphens in any | | | combination. | | | | | | Upper and lower case are significant in the | | | password. | | | | | | Press Enter. | The requested change is made in the data | | | dictionary. | | | | --------------------------------------------------------------------------------------------- Table Front-0. (cont.) --------------------------------------------------------------------------------------------- | | | | What You Do | What Happens | | | | --------------------------------------------------------------------------------------------- | | | | 14. Choose Done f8 to return to the User | The User Menu appears. | | Menu. | | | | | | Choose Done f8 to return to the | The Configuration Main Menu appears. | | Configuration Main Menu. | | | | | | Choose Done f8 to return to the | The Administrator Utility Main Menu | | Administrator Utility Main Menu. | appears. | | | | | Choose Exit ADMIN f8 to exit from the | The Administrator Utility completes its | | utility. | operation and the MPE prompt returns. | | | | ---------------------------------------------------------------------------------------------
NOTE We recommend, at this point, that you take the tutorial in the Information Access Server: Learning the Administrator Utility manual before going on with the rest of this manual. When you've finished the tutorial, read Chapters 1 and 2 of the Information Access Server: Database Administration manual. These chapters will provide a detailed overview of the configuration process outlined in the remainder of this manual. When you finished the tutorial and the two chapters recommended, return to this manual and go on to Chapters 1 and 2.


MPE/iX 5.0 Documentation