A final step in designing ACLs and identifiers
is to consider how and when different identifiers are going to be
used. Users often need to hold an identifier for different reasons,
such as updating databases or performing system operations. For this
reason, you may want to qualify the use of an identifier.
There are several ways to qualify identifiers.
One way is to use environmental identifiers, and another is to add
special attributes to identifiers, as described in “Customizing Identifiers”.
Environmental identifiers describe different types
of users based on their initial entry into the system. These identifiers---local,
dialup, remote, interactive, network, and batch---let you define a
large potential group of users according to their use of the system.
Typically, these types of identifiers are used in combination with
other identifiers.
For example, the following ACE permits user Martin
to have read, write, execute, and delete access to the object only
when logged in from a local terminal:
(IDENTIFIER=MARTIN+LOCAL,ACCESS=READ+WRITE+EXECUTE+DELETE)
|
You can use the environmental identifiers in ACLs
to deny access to an entire class of logins. For example, the following
ACE denies access to all dialup users:
(IDENTIFIER=DIALUP,ACCESS=NONE)
|
In assigning these environmental identifiers to
users in a DECwindows environment, remember that DECwindows processes
can be virtually any type of process. For example, a user may choose
to run DECwindows Mail in a batch job. Even though the process is
communicating interactively with a user through a DECwindows workstation,
it is still classified as a batch job.