![]() |
![]() HP OpenVMS Systems Documentation |
![]() |
OpenVMS System Manager's Manual
7.4.2.2 Creating SYSTEST and SYSTEST_CLIG Accounts (Alpha Only)The following example shows typical dialogue with CREATE_SPECIAL_ACCOUNTS.COM when it is used to create SYSTEST and SYSTEST_CLIG accounts:
Enabling SYSTEST_CLIG Accounts (Alpha Only)
Although you create a SYSTEST_CLIG account using CREATE_SPECIAL_ACCOUNTS.COM, the account is disabled. Enable the account using the /FLAGS=NODISUSER command; for example:
Disabling SYSTEST_CLIG Accounts (Alpha Only)
To disable a SYSTEST_CLIG account again, use the /FLAGS=DISUSER command; for example:
7.4.3 Maintaining System-Supplied Accounts (VAX Only)Immediately after installing a VAX system, make the following changes in the UAF:
7.4.4 Using the SYSTEM AccountUse the SYSTEM account only for system functions such as performing backups and installing maintenance updates. The SYSTEM account has full privileges enabled by default, so exercise caution when you use it. For example, because you have BYPASS privilege, the system allows you to delete any file, no matter what its protection. If you enter an incorrect name or spurious asterisk, you might destroy files that you or other users need to keep. Consider using an account with fewer privileges for daily system management activities. If you decide not to use the SYSTEM account for daily system management activities, you can still receive mail from the SYSTEM account. To do this, log in to the SYSTEM account, invoke Mail, and use the SET FORWARD command in the following format to forward the mail to another account:
For example:
7.4.5 Using AUTHORIZE to Maintain UAF AccountsUsing the Authorize (AUTHORIZE) utility, you create and maintain UAF accounts by assigning values to various fields within each account record. The values you assign perform the following actions:
See Section 7.11 for a list of privileges, limits, and quotas that you can specify in the resource control and privileges fields of the UAF record.
The following example shows a typical user record for a restricted user account. Callouts describe the fields.
7.5 Preparing to Add User Accounts
This section describes what to do before adding a user account.
How you set up a user account depends on the needs of the individual user. Table 7-5 lists the account types and their characteristics.
7.5.2 Performing Additional TasksWhen adding a user account, you must perform the following steps:
These tasks are described in detail in the sections that follow. When
you have completed the tasks for preparing to add a user account, you
are ready to add the account by following one of the methods described
in Section 7.6.
To determine a user name and password, use naming conventions that take into consideration the nature of the account. For example, some installations use the name of the person who will use the account. Captive accounts, on the other hand, often use a name that describes the function of the account. Thus, an interactive or restricted account for Robert Jones might have a user name of JONES, while a captive account for an inventory system might be called INV103289, which gives some indication of the function of the account but is not easy to guess. Remember to assign unique user names. For interactive accounts, it is best to let the person using the account control the password. Initially, provide a password that is not easy to guess. The user will be forced to change the password at first login. Only the person using the account should know the password. Encourage all users to set obscure passwords of at least eight characters and to change them frequently, or force the use of generated passwords with the /FLAGS=GENPWD and /GENERATE_PASSWORD qualifiers. You can use the /PWDMINIMUM and /PWDLIFETIME qualifiers with the AUTHORIZE command ADD or MODIFY to enforce timely password modifications. The following table lists the qualifiers and specific action.
For captive accounts, the degree of sensitivity of the data used by the account should determine the type of password. For example, the password for a payroll application should be obscure, while the password for a suggestions account might not even be required; it could be null (in which case users would not be prompted for the password). Prohibit users from changing the passwords of captive accounts. To do this, specify /FLAGS=LOCKPWD when you create the captive account. Change the password whenever you feel it might be compromised (for example, if a person using the account moves to another job). To change a user's password, use the following command format at the UAF> prompt:
See the OpenVMS System Management Utilities Reference Manual for more information about AUTHORIZE.
Assign each account a unique user identification code (UIC). A UIC has two formats: alphanumeric and numeric. The alphanumeric UIC consists of a member name and, optionally, a group name separated by a comma and enclosed within brackets (for example, [DOCO,PRICE]). These identifiers might also appear as numeric characters consisting of a group identifier and a member identifier in octal (for example, [11,200]). Assign accounts the same group number if their owners perform similar work, access the same files frequently, or use many of the same logical names. See the OpenVMS Guide to System Security for a detailed discussion of the user identification code.
7.5.2.3 Adding a Disk Quota EntryDisk quotas limit the amount of disk space available to individual users on a particular volume. If disk quotas are in effect for a disk volume, run the System Management utility (SYSMAN) and use the DISKQUOTA command to add an entry for the new UIC as follows:
The sum of the quota and overdraft values is the absolute maximum
number of blocks allotted to the user, which in this example is 2500
blocks. For more information about SYSMAN and establishing disk quotas,
see the OpenVMS System Management Utilities Reference Manual.
For each interactive account, create a top-level (default) directory (using the DCL command CREATE/DIRECTORY). In the directory place a login file, login file template, and/or logout file, as appropriate. The interactive user creates and maintains files and subdirectories in this directory. Make the owner of the directory the UIC for the new account. Usually, you also use the name of the account for the default directory. If you decided on an account name of JONES and a UIC of [014,1], you would enter the following DCL command to create a default directory for the account on the volume DISK$USER:
The volume on which the directory is established depends on which devices you reserve for interactive accounts and how much space is available on each.
The default file specification you provide the new account (when you
run AUTHORIZE) should be the name of the device and the name of the
top-level directory you used in the DCL command CREATE/DIRECTORY.
For a captive account, whether you create a top-level directory depends
on the nature of the user system. If people use files in a particular
directory, make that directory the default directory specification. For
example, if the inventory system uses the files
DISK$DATA:[INV]STOCK1.DAT and DISK$DATA:[INV]STOCK2.DAT, make the
default device specification DISK$DATA: and make the default directory
specification [INV].
The level of security that you establish for an account depends on the purpose of the account and whether it is shared with other users or groups. For an interactive user account, the default UIC-based protection is usually adequate. The default protection for top-level directories is no world access. However, for new user directories, you might want to change the default to world execute access so that users will not have to change directory protection to allow other users read access to files in that directory. Users can further protect their files and subdirectories on an individual basis with the DCL command SET SECURITY.
Using Access Control Lists (ACLs)
In some cases, such as project accounts, you might want to set up an additional level of protection by using access control lists (ACLs). ACL-based protection provides a more refined level of security in cases where different groups or members of overlapping groups share access to an account such as a project account. ACLs offer a way to grant or deny users access to any security-relevant object. Section 7.9.2 describes how to set up a project account with ACL-based protection. For more information about how to set up and edit ACLs, see the OpenVMS Guide to System Security and the OpenVMS System Management Utilities Reference Manual.
Using AUTHORIZE to Maintain the Rights Database
The rights database (RIGHTSLIST.DAT) is a file that associates users of the system with access-controlling identifiers. When a user logs in, the system checks the rights database for the identifiers that the user holds. You use the Authorize utility (AUTHORIZE) to maintain the rights database by adding or deleting identifiers as needed. By allowing a group of users to hold common identifiers, you can create a group protection scheme that is more intricate than that provided by the UIC-based protection. Protected subsystems provide conditional access to data. In a protected subsystem, an application protected by normal access controls serves as a gatekeeper to objects belonging to the subsystem. While users are running the application, their process rights list contains identifiers giving them access to objects owned by the subsystem. As soon as users exit from the application, these identifiers and, therefore, the users' access rights to objects are taken away. For more information, see the OpenVMS Guide to System Security.
|