HP OpenVMS Systems Documentation
OpenVMS User's Manual
Previous
Contents
Index
Chapter 10
10
Controlling Access to Resources
10.1
Displaying the Rights Identifiers of Your Process
10.2
Security Profile of Objects
10.2.1
Modifying a Security Profile
10.3
Interpreting Protection Codes
10.4
Default File Protection
10.4.1
Default UIC Protection
10.4.2
Default ACL Protection
10.4.3
Renaming Files
10.4.4
Explicit File Protection
10.5
Accessing Files Across Networks
10.5.1
Access Control Strings
10.5.2
Protecting Access Control Strings
10.5.3
Using Proxy Login Accounts to Protect Passwords
10.5.4
General Access Proxy Accounts
10.6
Auditing Access to Your Account and Files
10.6.1
Observing Your Last Login Time
10.6.2
Events That Can Trigger Security Alarms
10.6.3
Security Audit Log Files
10.6.4
Adding ACEs to Sensitive Files
Chapter 11
11
Defining Logical Names for Devices and Files
11.1
Logical Name Characteristics
11.2
Using System-Defined Logical Names
11.3
Creating Logical Names
11.3.1
Using the DEFINE Command
11.3.2
Creating Logical Names in Command Procedures for File I/O
11.3.3
Rules for Creating Logical Names
11.3.4
Translation Attributes
11.3.5
Access Modes
11.3.6
Creating Logical Node Names
11.3.6.1
Using Logical Node Names in File Specifications
11.3.6.2
Overriding Access Control Strings
11.3.7
Creating Multiple Logical Names for the Same Object
11.4
Deleting Logical Names
11.5
Logical Name Translation
11.5.1
Iterative Translation
11.5.2
Missing Fields Filled in with System Defaults
11.5.3
Default Search Order for Logical Name Translations
11.6
Displaying Logical Names
11.6.1
Specifying a Logical Name Table to Search
11.6.2
Displaying Translation Attributes and Access Modes
11.7
Creating and Using Search Lists
11.7.1
Using Search Lists with Commands That Accept Wildcards
11.7.2
Using a Search List with the SET DEFAULT Command
11.7.3
Using a Search List with the RUN Command
11.7.4
Search Order for Multiple Search Lists
11.8
Logical Name Table Characteristics
11.8.1
Logical Name Table Directories
11.8.2
Displaying the Structure of Directory Tables
11.9
Default Logical Name Tables
11.9.1
Process Logical Name Directory
11.9.2
Process Logical Name Table
11.9.3
System Logical Name Directory
11.9.4
Shareable Logical Name Tables
11.9.5
Default Protection of Shareable Logical Name Tables
11.9.6
Privilege and Access Requirements for Managing Shareable Logical Names
11.10
Creating Logical Name Tables
11.10.1
Creating Process-Private Logical Name Tables
11.10.2
Creating Shareable Logical Name Tables
11.10.3
Creating Clusterwide Logical Name Tables
11.10.4
Privilege and Access Requirements
11.10.5
Modifying the Default Protection
11.10.6
Establishing Quotas for Logical Name Tables
11.10.6.1
Setting Job Table Quotas
11.11
Modifying the Order of Logical Name Translations
11.12
Deleting Logical Name Tables
11.13
Process-Permanent Logical Names
11.13.1
Equivalence Name Differences Between Interactive and Batch Processing
11.13.2
Redirecting File I/O Using Process-Permanent Logical Names
11.13.2.1
Redefining SYS$INPUT
11.13.2.2
Redefining SYS$OUTPUT
11.13.2.3
Redefining SYS$ERROR
11.13.2.4
Redefining SYS$COMMAND
Chapter 12
12
Defining Symbols, Commands, and Expressions
12.1
About Symbols
12.1.1
Comparing Logical Names and Symbols
12.2
Using Symbols
12.2.1
Using Symbols to Represent DCL Commands
12.2.2
Symbol Abbreviation
12.2.3
Defining Foreign Commands
12.2.4
Symbol Substitution
12.2.5
Deleting Symbols
12.3
Displaying Symbols
12.4
Using Symbols with Other Symbols
12.4.1
Symbol Concatenation
12.4.2
Including Symbols in String Assignments
12.5
Using Symbols to Store and Manipulate Data
12.6
Character Strings
12.6.1
Defining Character Strings
12.6.2
Character String Expressions
12.6.3
Character String Operations
12.6.4
Comparing Character Strings
12.6.5
Replacing Substrings
12.7
Using Numeric Values and Expressions
12.7.1
Specifying Numbers
12.7.2
Internal Storage of Numbers
12.7.3
Performing Arithmetic Operations
12.7.4
Comparing Numbers
12.7.5
Performing Numeric Overlays
12.8
Using Logical Values and Expressions
12.8.1
Logical Operations
12.8.2
Logical Expressions
12.8.3
Logical Operation Results
12.8.4
Using Values Returned by Lexical Functions
12.8.5
Order of Operations
12.8.6
Evaluating Data Types
12.9
Converting Value Types in Expressions
12.9.1
Converting Strings to Integers
12.9.2
Converting Integers to Strings
12.10
Understanding Symbol Tables
12.10.1
Local Symbol Tables
12.10.2
Global Symbol Tables
12.10.3
Symbol Table Search Order
12.11
Masking the Value of Symbols
12.11.1
SET SYMBOL Command
12.11.2
Symbol Scoping State
12.12
Understanding Symbol Substitution
12.12.1
Forced Symbol Substitution
12.12.2
Symbol Substitution Operators
12.13
The Three Phases of Command Processing
12.13.1
Phase 1: Command Input Scanning
12.13.2
Phase 2: Command Parsing
12.13.3
Phase 3: Expression Evaluation
12.13.4
Repetitive and Iterative Substitution
12.13.5
Undefined Symbols
12.14
An Alternative to Using Symbols: Automatic Foreign Commands
12.14.1
Using Automatic Foreign Commands
12.14.2
Automatic Foreign Command Restrictions
Previous
Next
Contents
Index