VMS Help
Hints, Security
*Conan The Librarian (sorry for the slow response - running on an old VAX)
|
|
Modifying and displaying the security characteristics of
protected objects.
SET SECURITY Modifies the access control list (ACL),
protection code, and owner of a protected
object.
SHOW SECURITY Displays the name, class, and profile of a
protected object. The profile lists the object's
access control list (ACL), protection code, and
owner.
A protection code controls the type of access allowed (or denied)
to a particular user or group of users. It has the following
format:
[category:list of access allowed(,category:list of access allowed,...)]
o Category
User categories include system (S), owner (O), group (G),
and world (W). Each category can be abbreviated to its first
character. Categories have the following definition:
System Any user process or application whose UIC is
in the range 1 through 10 (octal), has SYSPRV
privilege, or is in the same group as the owner
and holds GRPPRV.
Owner Any user process or application whose UIC is
identical to the UIC of the object.
Group Any user process or application whose Group UIC is
identical to the group UIC of the object.
World Any user process or application on the system.
When specifying more than one user category, separate the
categories with commas, and enclose the entire code in
parentheses. You can specify user categories and access types
in any order.
A null access specification means no access, so when you omit
an access type for a user category, that category of user
is denied that type of access. To deny all access to a user
category, specify the user category without any access types.
Omit the colon after the user category when you are denying
access to a category of users.
o access-list
For files, the access types include read (R), write (W),
execute (E), or delete (D). The access type is assigned
to each ownership category and is separated from its
access types with a colon (:); for example, SET SECURITY
/PROTECTION=(S:RWE,O:RWE,G:RE,W). File access types have the
following meanings:
Read Gives you the right to read, print, or copy a disk
file. With directory files, the right to read or list
a file and use a file name with wildcard characters
to look up files. Read access implies execute access.
Write Gives you the right to write to or change the
contents of a file, but not delete it. Write access
allows modification of the file characteristics that
describe the contents of the file. With directory
files, the right to make or delete an entry in the
catalog of files.
Execute Gives you the right to execute a file that contains
an executable program image or DCL command procedure.
With a directory file, the right to look up files
whose names you know.
Delete Gives you the right to delete the file. To delete
a file, you must have delete access to the file and
write access to the directory that contains the file.
Control Gives you the right to file characteristics,
including the protection code and ACL. Special
restrictions apply to changing the owner of a file.
3 - Assigning File Profiles
|
The new file obtains its owner, protection code, and ACL from a
number of sources. The ownership assignment of a new file is done
independently of protection and ACL.
3.1 - Ownership
If any of the following conditions are true, then you can assign
an identifier as the owner of a file:
o The identifier matches your process UIC.
o You hold the identifier with the Resource attribute.
o You hold GRPPRV privilege and the identifier's group number
matches your UIC group.
o You hold SYSPRV privilege.
A file receives its owner identifier from the first applicable
source that you are allowed to assign:
o The explicit assignment of an owner at creation with the
/OWNER_UIC qualifier to the CREATE or COPY command
o The previous version
o The parent directory
o The process UIC
3.2 - Protection Code and ACL
The sources of a new file's protection code and ACL are similar
to those of ownership and are considered in the same order. The
system assigns a file's protection code and ACL from one of the
following sources:
1. The explicit assignment of elements at creation
2. The profile of the previous version of the file, if one exists
3. A Default Protection ACE and Default ACL on the parent
directory
4. The UIC and protection defaults of the process issuing the
command
5. One of the above with provision for the user creating the file
See the OpenVMS Guide to System Security for further information.
The SET AUDIT command and the SHOW AUDIT command provide the
management interface to the security auditing system, and the
ANALYZE/AUDIT command processes the audit log file.
ANALYZE/AUDIT Processes event messages in security audit
log files to produce reports of security-
related events on the system.
SET AUDIT/ENABLE Select categories of events to audit.
/AUDIT
SET AUDIT/SERVER Change the operational characteristics of
the audit server
SET AUDIT/JOURNAL Establish the location of the audit log
/DESTINATION file.
SET AUDIT/RESOURCE Control the monitoring of the log file's
disk space.
SHOW AUDIT Displays the security auditing
characteristics in effect on the system.
[legal]
[privacy]
[GNU]
[policy]
[netiquette]
[sponsors]
[FAQ]
Polarhome, production since 1999.
Member of Polarhome portal.