HP OpenVMS Systems Documentation
OpenVMS Programming Concepts Manual
Previous
Contents
Index
Chapter 29
29
Using the Distributed Transaction Manager
29.1
Introduction to DECdtm Services
29.1.1
Sample Atomic Transaction
29.1.2
Transaction Participants
29.1.3
DECdtm System Services
29.1.4
Default Transactions
29.2
Calling DECdtm System Services
29.3
Using DECdtm Services: An Example
Chapter 30
30
Creating User-Written System Services
30.1
Overview
30.2
Writing a Privileged Routine (User-Written System Service)
30.3
Creating a Privileged Shareable Image (VAX Only)
30.3.1
Creating User-Written Dispatch Routines on VAX Systems
30.3.2
Creating a PLV on VAX Systems
30.3.3
Declaring Privileged Routines as Universal Symbols Using Transfer Vectors on VAX Systems
30.4
Creating a User-Written System Service (Alpha Only)
30.4.1
Creating a PLV on Alpha Systems
30.4.2
Declaring Privileged Routines as Universal Symbols Using Symbol Vectors on Alpha Systems
Chapter 31
31
System Security Services
31.1
Overview of the Operating System's Protection Scheme
31.2
Identifiers
31.2.1
Identifier Format
31.2.2
General Identifiers
31.2.3
System-Defined Identifiers
31.2.4
UIC Identifiers
31.2.5
Facility Identifiers
31.2.6
Identifier Attributes
31.3
Rights Database
31.3.1
Initializing a Rights Database
31.3.2
Using System Services to Affect a Rights Database
31.3.2.1
Translating Identifier Values and Identifier Names
31.3.2.2
Adding Identifiers and Holders to the Rights Database
31.3.2.3
Determining Holders of Identifiers
31.3.2.4
Determining Identifiers Held by a Holder
31.3.2.5
Modifying the Identifier Record
31.3.2.6
Modifying a Holder Record
31.3.2.7
Removing Identifiers and Holders from the Rights Database
31.3.3
Search Operations
31.3.4
Modifying a Rights List
31.4
Persona (Alpha Only
1
)
31.4.1
Impersonation Services (Alpha Only)
31.4.1.1
Using Impersonation System Services
31.4.2
Per-Thread Security (Alpha Only)
31.4.2.1
Previous Security Model
31.4.2.2
Per-Thread Security Model
31.4.3
Persona Extensions (Alpha Only)
31.5
Managing Object Protection
31.5.1
Protected Objects
31.5.2
Object Security Profile
31.5.2.1
Displaying the Security Profile
31.5.2.2
Modifying the Security Profile
31.5.3
Types of Access Control Entries
31.5.3.1
Design Considerations
31.5.3.2
Translating ACEs
31.5.3.3
Creating and Maintaining ACEs
31.6
Protected Subsystems
31.7
Security Auditing
31.8
Checking Access Protection
31.8.1
Creating a Security Profile
31.8.2
SYS$CHKPRO System Sevice
31.8.3
SYS$CHECK_ACCESS System Service
31.9
SYS$CHECK_PRIVILEGE
31.10
Implementing Site-Specific Security Policies
31.10.1
Creating Loadable Security Services
31.10.1.1
Preparing and Loading a System Service
31.10.1.2
Removing an Executive Loaded Image
31.10.2
Installing Filters for Site-Specific Password Policies
31.10.2.1
Creating a Shareable Image
31.10.2.2
Installing a Shareable Image
Chapter 32
32
Logical Name and Logical Name Tables
32.1
Logical Name System Services and DCL Commands
32.1.1
Logical Names, Equivalence Names, and Search Lists
32.1.2
Logical Name Tables
32.1.2.1
Logical Name Directory Tables
32.1.2.2
Process, Job, Group, System and Clusterwide Default Logical Name Tables
32.1.2.2.1
Process Logical Name Table
32.1.2.2.2
Job Logical Name Table
32.1.2.2.3
Group Logical Name Table
32.1.2.2.4
System Logical Name Table
32.1.2.2.5
Clusterwide Logical Name Table
32.1.3
Logical Name Table Names and Search Lists
32.1.4
Specifying the Logical Name Table Search List
32.2
Creating User-Defined and Clusterwide Logical Name Tables
32.2.1
Creating Clusterwide Logical Name Tables
32.3
Checking Access and Protection
32.4
Specifying Access Modes
32.5
Translating Logical Names
32.6
Specifying Attributes
32.7
Establishing Logical Name Table Quotas
32.7.1
Directory Table Quotas
32.7.2
Default Logical Name Table Quotas
32.7.3
Job Logical Name Table Quotas
32.7.4
User-Defined Logical Name Table Quotas
32.8
Interprocess Communication
32.9
Using Logical Name and Equivalence Name Format Conventions
32.10
Using Logical Names and Logical Name Table System Services in Programs
32.10.1
Using SYS$CRELNM to Create a Logical Name
32.10.2
Using SYS$CRELNT to Create Logical Name Tables
32.10.3
Using SYS$DELLNM to Delete Logical Names
32.10.4
Using SYS$TRNLNM to Translate Logical Names
32.10.5
Using SYS$CRELNM, SYS$TRNLNM, and SYS$DELLNM in a Program Example
Previous
Next
Contents
Index