|
|
User's Guide to MPE/iX Security: HP 3000 MPE/iX Computer Systems > Chapter 4 Protecting Your Files with Capabilities, File Access Restrictions and LockwordsRestricting File Access |
|
Associated with each account, group, and individual file is a list of file access restrictions. Access restrictions apply to disk files only. Their restrictions are based on the following:
The access restrictions for any file describe who can access it and in what manner. Table 4-2 “File Access Modes” lists file access modes, the codes used to reference them, and their meanings. Table 4-2 File Access Modes
Table 4-3 “User Types” lists user types, the codes used to reference them, and their complete descriptions. Table 4-3 User Types
Users with system manager or account manager capability bypass the standard file access restrictions. A system manager has unlimited access to any file in the system, but can save files only in the system manager's own account. An account manager has unlimited access to any file in the account, except one with a negative file code. The account manager must have privileged mode (PM) capability to access a file with a negative file code. A file's group and account as well as your capabilities determine whether you have access to the file. For example, group librarian capability gives you special access to files in your home group. You do not have special access to files in other groups.
When a user tries to access a file, the system checks the account-level, group-level, and file-level file access restrictions. Those restrictions must give the user access rights at all three levels. If the user fails to pass the security check at any level, the system denies the user access to the file. Account file access restrictions are set when an account is created. You set group file access restrictions when you create a group. As the creator of a file, you can change its file-level access restrictions with the ALTSEC command. When you specify file access restrictions at a certain level, you list the file access modes available to each type of user. This listing has a special format. For example, at the account level, you might assign READ and EXECUTE access to any user and APPEND, WRITE, and LOCK access only to account users. These sample file security provisions have the following format:
In this example, READ and EXECUTE access are permitted to any user. APPEND, WRITE, and LOCK access are permitted to account members only. The system manager sets the access restrictions that apply to all files within a given account when creating the account. A system manager can change the initial restrictions at any time. At the account level, the system recognizes two user types and five access modes. The account-level user types are:
The five account level access modes are:
Refer to Table 3-1 “File Access Modes” for access mode descriptions and to Table 3-2 “User Categories” for user type descriptions. If the file access restrictions for an account are not explicitly stated, the system assigns the following default restrictions:
The account manager sets the file access restrictions that apply to all files within a group when creating the group. They can be equal to or more restrictive than the provisions specified at the account level. The group's file access restrictions can also be less restrictive than those of the account; such provisions effectively equate the group restrictions with the account restrictions, because a user who fails a security check at the account level is denied access at that point. The account manager can change initial group file access restrictions at any time. At the group level, the system recognizes five user types and six access modes. Access modes can be assigned to user types in any combination. The five group-level user types are:
The group level file access modes are:
Refer to Table 3-1 “File Access Modes” for access mode descriptions and to Table 3-2 “User Categories” for user type descriptions. If you do not specify group file access restrictions, the following default restrictions apply:
When you create a file, it has the default file-level security provisions assigned by MPE and the provisions assigned by the account and the group to which it belongs. Only the creator of a file may use the ACCESS= option of ALTSEC on a file. An Account Manager or System Manager can change the file-level security provision with the ALTSEC command by adding an ACD or changing and ACD. All access modes and all user types apply at the file level. Refer to Table 3-1 “File Access Modes” and Table 3-2 “User Categories” for their descriptions. If no security provisions are explicitly specified by the creating user, READ, APPEND, WRITE, LOCK, and EXECUTE access are permitted to all users (R,A,W,L,X:ANY), for all files, by default. Because the total security for a file always depends on security at all three levels, a file not explicitly protected from a certain access mode may benefit from the default protection at a higher level. For example, the default access restrictions at the file level allow the file to be read by any user, but the restrictions at the group level allow access only to group users. Thus, the file can be read only by a group user. In summary, the default file access restrictions at the account, group, and file levels combine to result in overall default file access restrictions as shown in Table 4-4 “Default File Access Restrictions”. Table 4-4 Default File Access Restrictions
In other words, when the default security provisions are in force at all levels, the standard user with default user attributes, has:
|
|