![]() |
![]() HP OpenVMS Systems Documentation |
![]() |
OpenVMS Guide to System Security
5.5.1 Naming Rules
The name of the object is a string of 1 to 44 characters. For group
global sections, the name is qualified by your UIC group number.
The global section class supports the following types of access: 5.5.3 Template ProfileFile-backed global sections share the security profile of the associated disk file. Whenever the profile of the backing file is modified, the global section's profile automatically changes. To modify the protection elements of file-backed global sections, you must modify the backing file instead. The global section class provides the following template profiles. Although the template assigns an owner UIC of [0,0], this value is only temporary. As soon as the object is created, the operating system replaces a 0 value with the value in the corresponding field of the creating process's UIC.
The operating system modifies the templates according to the values provided in the prot argument to $CRMPSC. The prot argument is ignored for file-backed sections.
To maintain compatibility with earlier versions of the operating
system, the DEFAULT templates have protection codes allowing world
access. Some applications may need a more restrictive default than the
templates provide. If you do choose to restrict global section access,
be aware that the more restrictive access can cause applications to
fail in ways that are difficult to diagnose.
The SYSGBL privilege is required to create or delete a system global
section. The PFNMAP privilege is necessary to create or delete a page
frame section, and the PRMGBL privilege is required to create or delete
a permanent global section.
The following types of events can be audited, provided the security administrator enables auditing for the appropriate event class:
5.5.6 Permanence of the Object
A global section and its security profile need to be reset after every
system boot.
Logical name assignments are maintained in logical name tables. A
logical name table can be accessible to only one process, or it can be
shareable if its parent table is shareable. All shareable name tables
are listed in the LNM$SYSTEM_DIRECTORY, the system directory table. It
is shareable logical name tables that the operating system protects.
The name of a logical name table is a string of 1 to 32 characters.
The logical name table class supports the following types of access: 5.6.3 Template ProfileThe logical name table class provides the following template profiles. Although the template assigns an owner UIC of [0,0], this value is only temporary. As soon as the object is created, the operating system replaces a 0 value with the value in the corresponding field of the creating process's UIC.
5.6.4 Privilege RequirementsThe operating system allows read and write access to the group logical name tables with GRPNAM privilege and to the system logical name table with SYSNAM privilege. Deletion of a shared table from the system directory requires SYSNAM privilege, and deletion of a logical name from the group directory requires GRPNAM privilege. Deletion of a parent logical name table results in the deletion of all its descendant logical name tables.
Creation or deletion of an inner-mode logical name or logical name
table requires SYSNAM privilege (or being in an inner mode).
The following events can be audited, provided the security administrator enables auditing for the event class:
5.6.6 Permanence of the Object
A logical name table and its security profile must be reset each time
the system is rebooted.
A queue is a set of jobs to be processed. In general, queues are of two
types, generic or execution. No processing takes place in generic
queues. Execution queues hold jobs that will execute on an execution
queue when one is available. Execution queues can be batch queues,
printer queues, server queues, or terminal queues.
A queue name is a string of 1 to 31 characters, including any
alphanumeric character, the dollar sign ($), or the underscore (_).
The queue class supports the following types of access:
Note: When a process receives read or delete access
through a protection code, it can operate on only its job in the queue.
However, when granted through an ACL, read and delete access allow a
process to operate on all jobs in the queue.
The queue class provides the following template profile:
5.7.4 Privilege Requirements
You need SYSNAM and OPER privileges to stop or start the queue manager.
OPER is necessary to either create and delete queues, or to change the
symbiont definition.
The following events can be audited, provided the security administrator enables auditing for the event class:
If access auditing is enabled for both files and queues, one queue
operation can generate a number of auditing messages because, within a
single operation, the operating system performs several access checks.
For example, before a job is executed on a print queue, the system
checks to see if you have read access to the file, and it checks for
read access again before printing the file.
Queues are permanent objects. They are stored in the system queue
database together with their security profiles.
Processes that access shared resources can coordinate access using the services of the lock manager. These services allow processes to associate a name with a resource, such as a file or a data structure, to arbitrate access to that resource, and to exchange limited information through a lock value block. The namespaces that catalog resources on which locks can be taken are called resource domains.
A process must become a member of a resource domain to take and release
locks and to read and write value blocks associated with resources in
that resource domain. A process implicitly joins the system and group
domains, but it explicitly joins other domains through a call to the
$SET_RESOURCE_DOMAIN system service. Access to all locks and value
blocks within a domain is controlled by access to the domain itself.
A resource domain is identified to $SET_RESOURCE_DOMAIN by a longword
binary value. However, the name of the resource domain object is a
string containing the resource number interpreted in octal surrounded
by brackets [] or angle brackets <>. Alternatively, the name of
the resource domain object can be expressed as an identifier enclosed
in brackets or angle brackets. The identifier must translate to a UIC
value; the group field of the UIC is used as the resource domain number.
The resource domain class supports the following types of access:
5.8.3 Template ProfileThe resource domain class provides the following template profile. The template assigns an owner UIC of [n,*] where n is the resource domain's number.
5.8.4 Privilege Requirements
The SYSLCK privilege allows lock access to the system resource domain
(Domain 0).
The following events can be audited, provided the security administrator enables auditing for the event class:
5.8.6 Permanence of the Object
Both the resource domain and its security elements are saved in
SYS$SYSTEM:VMS$OBJECTS.DAT.
The security class is the parent of all classes of protected objects. It protects the template profiles associated with the various object classes. Each object in the security class holds the following information:
Chapter 8 discusses how to manage objects in the security class.
The security class has the following members:
5.9.2 Types of AccessSecurity class objects support the following types of access:
5.9.3 Template ProfileThe security class object provides the following template profile:
5.9.4 Kinds of Auditing PerformedThe following events can be audited, provided the security administrator enables auditing for the event class:
5.9.5 Permanence of the Object
The security profiles of the security class object and all its members
are stored in the security object database.
A volume object is one or more ODS-2 disk volumes. The object consists of multiple volumes when they are part of a bound volume set. Although you might have access to the directories and files on the volume, you cannot access them if you do not have access to the volume itself. For access information on tapes and foreign volumes, see the OpenVMS System Manager's Manual and the Mount utility documentation in the OpenVMS System Management Utilities Reference Manual.
|