Disk-file security, Setting file security, Table 16-3 – HP NonStop G-Series User Manual

Page 335: Types of file access, Table 16-4, Levels of disk-file security

Advertising
background image

Managing Users and Security

Guardian User’s Guide 425266-001

16 -13

Disk-File Security

Disk-File Security

Each disk file has an owner and a file security. When you create a file, you are its
owner, and the file ownership is identified as your user ID. You remain the owner of the
file unless you, your group manager, or a super ID user (255, 255) delete it or transfer its
ownership to another user. As the file owner, you can secure the file with the File Utility
Program (FUP) to prevent unauthorized users from accessing it.

When you create a file, your default logon security is automatically assigned to any file
you create during a TACL session. To determine your default security, use the TACL
WHO command. Unless you specify a different security for a file, all files that you
create will have this default security.

Setting File Security

The four types of access for a disk file are read, write, execute, and purge (RWEP):

You set file security with the FUP SECURE command. You set your default security
attributes with the TACL DEFAULT command or TACL VOLUME command.
DEFAULT sets the logon (or saved) attributes, while VOLUME temporarily sets the
attributes.

Table 16-3. Types of File Access

Access

Definition

Read

Lets a file be read or copied, and lets a command file be executed using the
TACL OBEY command.

Write

Lets a file be modified.

Execute

Lets a file be executed as a process using the TACL RUN command (applies to
program files with file code 100).

Purge

Lets a file be deleted or renamed, or to have its definition altered.

Table 16-4. Levels of Disk-File Security

FUP Code

Program Value

Access

7

Local super ID only

U

6

Local or remote owner (any user with the owner’s user ID)

C

5

Local or remote member of the owner’s group (any member
of the owner’s community)

N

4

Any local or remote user

O

2

Local owner only

G

1

Local member of the owner’s group

A

0

Any local user

Local refers to access within a single system; remote refers to access between systems (or nodes) in a network.

Advertising
This manual is related to the following products: