HP OpenVMS Systemsask the wizard |
The Question is: Is it possible in VMS to restrict the login of a user account to specific terminals? Background: the [company] has defined workareas. All workers of one workarea uses the same vms-account. If one worker change the workarea and therefore works in a different location he should no longer be able to login with his old account. A workarea has about 700 workers in 3 shift operation and it is impossible to work with individuell accounts. Thank you in anticipation The Answer is : Inferring details left unstated in the question, it appears there is a belief that an accountability and/or security problem exists. The OpenVMS Wizard would strongly encourage the use of individually assigned usernames and unique UICs, as this provides for better security and better accountability. Many OpenVMS sites operate with numbers of entries in SYSUAF well into the tens of thousands, using DCL procedures for basic user maintenance tasks. Other approaches -- lacking individual accountability -- involve using the automatic login facility (SYSALF), or the use of DCL within the SYLOGIN that performs the necessary verification of the login source. Some of the options include: The SYS$REM* logical names f$getdvi("TT","TT_ACCPORNAM") f$getdvi("TT","FULLDEVNAM") An OpenVMS security identifier etc. Alternatively, you could customize LOGINOUT to perform the processing of the login source directly, via the available LGI callouts mechanism. Since the current configuration presently provides no user-specific security, the use of a null password and the automatic login facility (SYSALF) would be entirely appropriate. Based solely on the source of the login, the user is automatically entered into the correct username. More complex options include approaches that do not involve logging into the system -- the user interface is always available to the client via web, GUI, or other approach at all times, and the user does not particularly need to connect to the system. Whether the application performs its own verification and/or authentication is another discussion, and one based on local security requirements.
|