HP OpenVMS Systems Documentation |
OpenVMS System Management Utilities Reference Manual
MODIFY/PROXY
Modifies an entry in the network proxy authorization file to specify a different local account as the default proxy account for the remote user or to specify no default proxy account for the remote user. FormatMODIFY/PROXY node::remote-user Parameters
Qualifier
DescriptionUse the MODIFY/PROXY command to specify a different local account as the default proxy account for the remote user or to specify that there is no default proxy account for the remote user. Whenever you modify user entries, AUTHORIZE signals DECnet to update its volatile database. Proxy modifications take effect immediately on all nodes in a cluster that share the proxy database. Example
MODIFY/SYSTEM_PASSWORD
Changes the systemwide password (which is different from the password for the SYSTEM user name). This command operates similarly to the DCL command SET PASSWORD/SYSTEM. FormatMODIFY/SYSTEM_PASSWORD= system-password Parameter
QualifiersNone. DescriptionFor a detailed description of the effects of this command, refer to the discussion of the SET PASSWORD/SYSTEM command in the OpenVMS Guide to System Security. Example
REMOVE
Deletes a SYSUAF user record and corresponding identifiers in the rights database. The DEFAULT and SYSTEM records cannot be deleted. FormatREMOVE username Parameter
Qualifier
DescriptionIf you remove a SYSUAF record for a user who also appears as a local user in the network user authorization file, every network authorization record for that user is also removed. Example
REMOVE/IDENTIFIER
Removes an identifier from the rights database. FormatREMOVE/IDENTIFIER id-name Parameter
QualifiersNone. Example
REMOVE/PROXY
Deletes network proxy access for the specified remote user. FormatREMOVE/PROXY node::remote-user [local-user,...] Parameters
QualifiersNone. Example
RENAME
Changes the user name of the SYSUAF record (and, if specified, the corresponding identifier) while retaining the characteristics of the old record. FormatRENAME oldusername newusername Parameters
Qualifiers
DescriptionThe RENAME command renames a SYSUAF record. It changes the user name of the SYSUAF record (and, if specified, the corresponding identifier) while retaining the characteristics of the old record. Retention of these characteristics can be particularly helpful when a user's name changes.
|
#1 |
---|
UAF> RENAME HAWKES KRAMERDOVE/PASSWORD=MARANNKRA %UAF-I-PRACREN, proxies to HAWKES renamed %UAF-I-RENMSG, user record renamed %UAF-I-RDBMDFYMSG, identifier HAWKES modified |
The command in this example changes the name of the account Hawkes to Kramerdove, modifies the user name identifier for the account, and renames all proxies to the account.
#2 |
---|
UAF> RENAME HAWKES KRAMERDOVE %UAF-I-PRACREN, proxies to HAWKES renamed %UAF-I-RENMSG, user record renamed %UAF-W-DEFPWD, Warning: copied or renamed records must receive new password %UAF-I-RDBMDFYMSG, identifier HAWKES modified |
This example shows the warning message that the system displays if you fail to specify a new password with the RENAME command.
Renames an identifier in the rights database.
RENAME/IDENTIFIER current-id-name new-id-name
current-id-name
Specifies the name of an identifier to be renamed.new-id-name
Specifies the new name for the identifier.
None.
The RENAME/IDENTIFIER command is functionally equivalent to the following AUTHORIZE command:
MODIFY/IDENTIFIER/NAME=new-id-name id-name
UAF> RENAME/IDENTIFIER Q1SALES Q2SALES %UAF-I-RDBMDFYMSG, identifier Q1SALES modified |
The command in this example renames the identifier Q1SALES to Q2SALES.
Takes an identifier away from a user.
REVOKE/IDENTIFIER id-name user-spec
id-name
Specifies the identifier name. The identifier name is a string of 1 to 31 alphanumeric characters. The name can contain underscores and dollar signs. It must contain at least one nonnumeric character.user-spec
Specifies the UIC identifier that uniquely identifies the user on the system. This type of identifier appears in alphanumeric format, not numeric format; for example, [GROUP1,JONES].
The REVOKE/IDENTIFIER command edits RIGHTSLIST.DAT, removing the user's name from the list of those who hold a given identifier. The change does not affect the process rights list of any current processes.
UAF> REVOKE/IDENTIFIER INVENTORY CRAMER %UAF-I-REVOKEMSG, identifier INVENTORY revoked from CRAMER |
The command in this example revokes the identifier INVENTORY from the user Cramer. Cramer loses the identifier and any resources associated with it.
Note that because rights identifiers are stored in numeric format, it is not necessary to change records for users holding a renamed identifier.
Displays reports for selected UAF records on the current SYS$OUTPUT device.
SHOW user-spec
user-spec
Specifies the user name or UIC of the requested UAF record. If you omit the user-spec parameter, the UAF records of all users are listed. The asterisk (*) and percent sign (%) wildcard characters are permitted in the user name.
/BRIEF
Specifies that a brief report be displayed. In the report, the Directory field displays one of the following items:
- Disuser---The account has been disabled.
- Expired---The account has expired.
- A device and directory name---The login device and directory for the account (for example, DOCD$:[SMITH]).
If you omit the /BRIEF qualifier, AUTHORIZE displays a full report.
/FULL
Specifies that a full report be displayed, including identifiers held by the user. Full reports include the details of the limits, privileges, login flags, and the command interpreter as well as the identifiers held by the user. The password is not listed./EXACT
Controls whether the SHOW command matches the search string exactly or treats uppercase and lowercase letters as equivalents. Enclose the specified string within quotation marks (" "). Use /EXACT with the /PAGE=SAVE and /SEARCH qualifiers./HIGHLIGHT[=keyword]
/NOHIGHLIGHT (default)
Identifies how to display the line that contains a string once it is found. The following keywords are valid:BLINK
BOLD (default)
REVERSE
UNDERLINEUse the /HIGHLIGHT qualifier with the /PAGE=SAVE and /SEARCH qualifiers.
/PAGE[=keyword]
/NOPAGE (default)
Controls the information display on a screen. The following keywords are valid:
CLEAR_SCREEN Clear the screen before displaying the next page. SCROLL Display a continuous stream of information. SAVE[= n] Store information and enable the navigational keys listed in Table 5-1. By default, the command saves 5 pages. The maximum page width is 255 columns.
Table 5-1 Screen Control Keys Key or Key Sequence Action Taken When Key or Key Sequence Is Pressed DOWN ARROW KEY Scroll the display down one line LEFT ARROW KEY Scroll the display one column to the left RIGHT ARROW KEY Scroll the display one column to the right UP ARROW KEY Scroll the display up one line Find (E1) Search for a new string in the information being displayed Insert Here (E2) Move the display to the right by half a screen Remove (E3) Move the display to the left by half a screen Select (E4) Switch from 80-column displays to 132-column displays Prev Screen (E5) Return to the previous page Next Screen (E6) Display the next page CTRL/Z Return to the UAF> prompt Help Display AUTHORIZE help text F16 (Do) Switch from the oldest to the newest page Ctrl/W Refresh the display /SEARCH=string
Used with the /PAGE=SAVE qualifier to specify a string to find in the information being displayed. You can dynamically change the search string by pressing the Find key (E1) while the information is being displayed./WRAP
/NOWRAP (default)
Used with the /PAGE=SAVE qualifier to limit the number of columns to the width of the screen and wrap lines that extend beyond the width of the screen to the next line.The /NOWRAP qualifier extends lines beyond the width of the screen. Use the /PAGE=SAVE qualifier and the screen control keys listed in Table 5-1 to view the entire screen.
The SHOW command produces reports on user authorization records. You can select the reports to be displayed, as follows:
- To display a single-user report, specify a user name.
- To display reports for all users in ascending sequence by user name, specify an asterisk wildcard character (*).
- To display reports for all users with a common UIC, specify the UIC. Users with the same UIC are listed in the order in which they were added to the SYSUAF.
You can also use the asterisk wildcard character to specify all or part of the UIC, as shown in the following examples:
Command Description SHOW [14,*] /BRIEF Displays a brief report for all users in group 14, in ascending sequence by member number. SHOW [*,6] /BRIEF Displays a brief report for all users with a member number of 6. SHOW [*,*] /BRIEF Displays a brief report for all users, in ascending sequence by UIC.
#1 |
---|
UAF> SHOW ROBIN |
The command in this VAX example displays a full report for the user ROBIN. The display corresponds to the first example in the description of the ADD command. Most defaults are in effect.
Username: ROBIN Owner: JOSEPH ROBIN Account: VMS UIC: [14,6] ([INV,ROBIN]) CLI: DCL Tables: DCLTABLES Default: SYS$USER:[ROBIN] LGICMD: Login Flags: Primary days: Mon Tue Wed Thu Fri Secondary days: Sat Sun No access restrictions Expiration: (none) Pwdminimum: 6 Login Fails: 0 Pwdlifetime: (none) Pwdchange: 15-JAN-2000 14:08 Last Login: (none) (interactive), (none) (non-interactive) Maxjobs: 0 Fillm: 300 Bytlm: 32768 Maxacctjobs: 0 Shrfillm: 0 Pbytlm: 0 Maxdetach: 0 BIOlm: 40 JTquota: 4096 Prclm: 2 DIOlm: 40 WSdef: 256 Prio: 4 ASTlm: 40 WSquo: 512 Queprio: 0 TQElm: 10 WSextent: 1024 CPU: (none) Enqlm: 200 Pgflquo: 32768 Authorized Privileges: TMPMBX NETMBX Default Privileges: TMPMBX NETMBX Identifier Value Attributes CLASS_CA101 %X80010032 NORESOURCE NODYNAMIC CLASS_PY102 %X80010049 NORESOURCE NODYNAMIC
Note
The quotas Pbytlm and Queprio are placeholders only.
#2 |
---|
UAF> SHOW [360,*] /BRIEF |
The command in this example displays a brief report for every user with a group UIC of 360.
Owner Username UIC Account Privs Pri Default Directory JOHN JAMES JAMES [360,201] USER Normal 4 DOCD$:[JAMES] SUSY JONES JONES [360,203] DOC Devour 4 DOCD$:[JONES] CLIFF BROWN BROWN [360,021] DOC All 4 disuser JOY CARTER CARTER [360,005] DOCSEC Group 4 expired
#3 |
---|
UAF> SHOW WELCH |
This command displays a full report for the restricted user WELCH. This display corresponds to the second example in the description of the ADD command.
Username: WELCH Owner: ROB WELCH Account: INV UIC: [14,51] ([14,51]) CLI: DCL Tables: DCLTABLES Default: SYS$USER:[WELCH] LGICMD: SECUREIN Login Flags: Restricted Diswelcome Disnewmail ExtAuth Primary days: Mon Tue Wed Thu Fri Secondary days: Sat Sun Primary 000000000011111111112222 Secondary 000000000011111111112222 Day Hours 012345678901234567890123 Day Hours 012345678901234567890123 Network: ----- No access ------ ##### Full access ###### Batch: #########--------####### ---------#########------ Local: #########--------####### ---------#########------ Dialup: ##### Full access ###### ----- No access ------ Remote: #########--------####### ---------#########------ Expiration: (none) Pwdminimum: 6 Login Fails: 0 Pwdlifetime: (none) Pwdchange: (pre-expired) Last Login: (none) (interactive), (none) (non-interactive) Maxjobs: 0 Fillm: 300 Bytlm: 32768 Maxacctjobs: 0 Shrfillm: 0 Pbytlm: 0 Maxdetach: 0 BIOlm: 40 JTquota: 4096 Prclm: 2 DIOlm: 40 WSdef: 256 Prio: 4 ASTlm: 40 WSquo: 512 Queprio: 4 TQElm: 10 WSextent: 1024 CPU: (none) Enqlm: 200 Pgflquo: 32768 Authorized Privileges: TMPMBX NETMBX Default Privileges: TMPMBX NETMBXNote that WELCH is a captive user who does not receive announcements of new mail or the welcome message when logging in. His login command file, SECUREIN.COM, is presumably a captive command file that controls all of his operations. (Such a command file never exits, but performs operations for its user and logs him out when appropriate.) The CAPTIVE flag prevents WELCH from escaping control of the command file by using Ctrl/Y or other means. Furthermore, he is restricted to logging in between the hours of 5:00 P.M. and 8:59 A.M. on weekdays and 9:00 A.M. and 5:59 P.M. on weekends. Although he is allowed to use dial-up lines at all times during the week, he is not allowed to log in over the network. On weekends, he is further restricted so that he cannot dial in at any time or use the DCL command SET HOST between the hours of 6:00 P.M. and 8:59 A.M.
Previous | Next | Contents | Index |