skip book previous and next navigation links
go up to top of book: HP OpenVMS Guide to System Security HP OpenVMS Guide to System Security
go to beginning of part: Security for the System Administrator Security for the System Administrator
go to previous page: Controlling the Login Process Controlling the Login Process
go to next page: Designing User GroupsDesigning User Groups
end of book navigation links

8Controlling Access to System Data and Resources  



This chapter describes how you design user groups and provide users with the identification (UICs, identifiers, privileges) they need to do their work. As part of the discussion, the chapter shows how to assign proper protection codes and ACLs to objects so that the user can work efficiently while, at the same time, system data and resources are properly protected. The chapter assumes you are familiar with the material in Protecting DataChapter 4 and Descriptions of Object ClassesChapter 5.

skip links to sections within this chapter.
Designing User Groups
Naming Individual Users in ACLs
Defining Sharing of Rights
Conditionalizing Identifiers for Different Users
Designing ACLs
Populating the Rights Database
Giving Users Privileges
Setting Default Protection and Ownership
Added Protection for System Data and Resources
end of content navigation links


go to previous page: Controlling the Login Process Controlling the Login Process
go to next page: Designing User GroupsDesigning User Groups