[OpenVMS documentation]
[Site home] [Send comments] [Help with this site] [How to order documentation] [OpenVMS site] [Compaq site]
Updated: 11 December 1998

OpenVMS System Management Utilities Reference Manual


Previous Contents Index

/SINCE

Indicates the utility must operate on records dated with the specified time or after the specified time.

Format

/SINCE [=time]

/NOSINCE


Keyword

time

Specifies the time used to select records. Records dated the same or later than the specified time are selected. You can specify an absolute time, a delta time, or a combination of the two. Observe the syntax rules for date and time described in the OpenVMS User's Manual.

If you specify /SINCE without the time, the utility uses the beginning of the current day.


Examples

#1

$ ANALYZE/AUDIT /SINCE=25-NOV-1998 -
_$ SYS$MANAGER:SECURITY.AUDIT$JOURNAL
      

The command in this example selects records dated later than November 25, 1998.

#2

$ ANALYZE/AUDIT /SINCE=25-NOV-1998:15:00 -
_$ SYS$MANAGER:SECURITY.AUDIT$JOURNAL
      

The command in this example selects records written after 3 P.M. on November 25, 1998.

/SUMMARY

Specifies that a summary of the selected records be produced after all records are processed.

You can use the /SUMMARY qualifier alone or in combination with the /BRIEF, the /BINARY, or the /FULL qualifier.


Format

/SUMMARY =presentation

/NOSUMMARY


Keyword

presentation

Specifies the presentation of the summary. If you do not specify a presentation criterion, ANALYZE/AUDIT summarizes the number of audits.

You can specify either of the following presentations:

COUNT

Lists the total number of audit messages for each class of security event that have been extracted from the security audit log file. This is the default.

PLOT

Displays a plot showing the class of the audit event, the time of day when the audit was generated, and the name of the system where the audit was generated.


Examples

#1

$ ANALYZE/AUDIT/SUMMARY SYS$MANAGER:SECURITY.AUDIT$JOURNAL
      

The command in this example generates a summary report of all records processed.


Total records read:        9701          Records selected:          9701 
Record buffer size:        1031 
Successful logins:          542          Object creates:            1278 
Successful logouts:         531          Object accesses:           3761 
Login failures:              35          Object deaccesses:         2901 
Breakin attempts:             2          Object deletes:             301 
System UAF changes:          10          Volume (dis)mounts:          50 
Rights db changes:            8          System time changes:          0 
Netproxy changes:             5          Server messages:              0 
Audit changes:                7          Connections:                  0 
Installed db changes:        50          Process control audits:       0 
Sysgen changes:               9          Privilege audits:            91 
NCP command lines:          120 

#2

$ ANALYZE/AUDIT/FULL/EVENT_TYPE=(BREAKIN,LOGFAIL)/SUMMARY -
_$ SYS$MANAGER:SECURITY.AUDIT$JOURNAL
      

The command in this example generates a full format listing of all logged audit messages that match the break-in or log failure event classes. A summary report is included at the end of the listing.

#3

$ ANALYZE/AUDIT/FULL/EVENT_TYPE=(BREAKIN,LOGFAIL)/SUMMARY=PLOT -
_$ SYS$MANAGER:SECURITY.AUDIT$JOURNAL
      

This command generates a histogram that you can display on a character-cell terminal.


4.4 ANALYZE/AUDIT Commands

This section describes the interactive commands available with the Audit Analysis utility (ANALYZE/AUDIT). The qualifiers for this section follow the standard rules of DCL grammar.

The utility runs interactively by default; you disable the feature with the /NOINTERACTIVE qualifier to the ANALYZE/AUDIT command. To enter interactive commands, press Ctrl/C at any time during the processing of a full or brief interactive display. At the COMMAND> prompt, you can enter any command listed in this section. Use the CONTINUE command to resume processing of the event records, or use the EXIT command to terminate the session.

CONTINUE

Resumes processing of event records.

Format

CONTINUE


Parameters

None.

Qualifiers

None.

Example


COMMAND> DISPLAY/SINCE=25-JAN-1998/SELECT=USERNAME=JOHNSON 
COMMAND> CONTINUE
      

The first command in this example selects only event records generated by user JOHNSON after January 25, 1998. The second command in the example displays a report based on the new selection criteria.

DISPLAY

Changes the criteria used to select event records.

Format

DISPLAY


Parameters

None.

For a more complete description of any one of the following qualifiers, refer to the description of the qualifier in the preceding ANALYZE/AUDIT Qualifiers section.


Qualifiers

/BEFORE=time

Controls whether only those records dated earlier than the specified time are selected.

/BRIEF

Controls whether a brief (one-line-per-record) format is used in ASCII displays.

/EVENT_TYPE=event-type[,...]

Controls whether only those records matching the specified event type are selected.

/FULL

Controls whether a full format for each record is used in ASCII displays.

/IGNORE=criteria[,...]

Controls whether records matching the specified criteria are excluded. If you specify /IGNORE two or more times, the criteria are combined. To specify a new set of exclusion criteria, include the /REMOVE qualifier with the /IGNORE qualifier.

/PAUSE=seconds

For full-format displays (/FULL), specifies the length of time each record is displayed.

/REMOVE

Controls whether the criteria specified by the /IGNORE and the /SELECT qualifiers are no longer to be used to select event records to be displayed.

/SELECT=criteria[,...]

Controls whether only those records matching the specified criteria are selected. If you specify /SELECT two or more times, the criteria are combined. To specify a new set of selection criteria, include the /REMOVE qualifier with the /SELECT qualifier.

/SINCE[=time]

Controls whether only those records dated the same or later than the specified time are selected.

Examples

#1

COMMAND> DISPLAY/EVENT_TYPE=SYSUAF
COMMAND> CONTINUE
      

The first command in this example selects records that were generated as a result of a modification to the system user authorization file (SYSUAF). The second command displays the selected records.

#2

COMMAND> DISPLAY/SELECT=USERNAME=CRICK
COMMAND> CONTINUE
   .
   .
   .
 [Ctrl/C]
 
COMMAND> DISPLAY/SELECT=USERNAME=WATSON
COMMAND> CONTINUE
      

The first DISPLAY command in this example selects records that were generated by user CRICK. The second command displays the selected records. The next DISPLAY command selects records that were generated by user WATSON. The last command in the example displays all records generated by users CRICK and WATSON.

EXIT

Terminates the session.

Format

EXIT


Parameters

None.

Qualifiers

None.

HELP

Provides online help information for using ANALYZE/AUDIT commands.

Format

HELP [topic]


Parameter

topic

Specifies the command for which help information is to be displayed. If you omit the keyword, HELP displays a list of available help topics and prompts you for a particular keyword.

Qualifiers

None.

Example


COMMAND> HELP DISPLAY
      

The command in this example displays help information about the DISPLAY command.

LIST

Changes the criteria used to select event records. The LIST command is synonymous with the DISPLAY command.

Format

LIST


Parameters

None.

Qualifiers

See the description of the DISPLAY command.

Example


COMMAND> LIST/EVENT_TYPE=SYSUAF
COMMAND> CONTINUE
      

The first command in this example selects records that were generated as a result of a modification to the system user authorization file (SYSUAF). The second command displays the selected records.

NEXT FILE

Controls whether the current security audit log file is closed and the next log file opened. The command is useful when you supply a wildcard file specification to the ANALYZE/AUDIT command; for example *.AUDIT$JOURNAL. If there are no other audit log files to open, the audit analysis session terminates and control returns to DCL.

Format

NEXT FILE


Parameters

None.

Qualifiers

None.

NEXT RECORD

Controls whether the next audit record is displayed. The NEXT RECORD command is the default for interactive mode.

This command is synonymous with the POSITION command.


Format

NEXT RECORD


Parameters

None.

Qualifiers

None.

POSITION

Moves the full-format display forward or backward the specified number of event records.

Format

POSITION number


Parameter

number

For positive numbers, displays the record that is the specified number of records after the current record. For negative numbers, displays the record that is the specified number of records before the current record.

Qualifiers

None.

Examples

#1

COMMAND> POSITION 100
      

The command in this example moves the display forward 100 event records.

#2

COMMAND> POSITION -100
      

The command in this example moves the display back 100 event records.

SHOW

Displays information about the selection or exclusion criteria currently being used to select event records.

Format

SHOW option[,...]


Parameter

option[,...]

Displays information about selection or exclusion criteria currently being used to select records. Specify one or more of the following options:
ALL Displays all criteria being used to select event records.
EXCLUSION_CRITERIA Displays the criteria being used to exclude event records.
SELECTION_CRITERIA Displays the criteria being used to select event records.

Qualifiers

None.

Example


COMMAND> SHOW SELECTION_CRITERIA
      

The command in this example displays the selection criteria currently in use to select records.


Chapter 5
Authorize Utility

5.1 AUTHORIZE Description

The Authorize utility (AUTHORIZE) is a system management tool used to control access to the system and to allocate resources to users. AUTHORIZE creates new records or modifies existing records in the following files:

These files store system authorization information. By default, they are owned by the system (UIC of [SYSTEM]) and are created with the following protection:


SYSUAF.DAT      S:RWED, O:RWED, G, W 
NETPROXY.DAT    S:RWED, O:RWED, G, W    
NET$PROXY.DAT   S, O, G, W            
RIGHTSLIST.DAT  S:RWED, O:RWED, G, W:         
 

To use AUTHORIZE, you must have write access to all three of these files (you must have an account with the user identification code (UIC) of [SYSTEM] or the SYSPRV privilege).

Note that you must have read access to the RIGHTSLIST.DAT file (or sufficient privileges) to display the rights identifiers held by other users.

Because certain images (such as MAIL and SET) require access to the system user authorization file (UAF) and are normally installed with the SYSPRV privilege, ensure that you always grant system access to SYSUAF.DAT.

When you install a new system, the software distribution kit provides the following records in the system user authorization file in SYS$SYSTEM:

On VAX systems:

On Alpha systems:

If the SYSUAF.DAT becomes corrupted or is accidentally deleted, you can use the template file SYSUAF.TEMPLATE in the SYS$SYSTEM directory to recreate the file, as follows:


$ SET DEFAULT SYS$SYSTEM
$ COPY SYSUAF.TEMPLATE SYSUAF.DAT

The file SYSUAF.TEMPLATE contains records that are identical to those defined when the system was installed.

To make an emergency backup for the system SYSUAF file, you can create a private copy of SYSUAF.DAT. To affect future logins, copy a private version of SYSUAF.DAT to the appropriate directory, as shown in the following example:


$ COPY MYSYSUAF.DAT SYS$COMMON:[SYSEXE]:SYSUAF.DAT-
_$ /PROTECTION=(S:RWED,O:RWED,G,W)

5.2 AUTHORIZE Usage Summary

The Authorize utility (AUTHORIZE) is a system management tool that enables you to control access to the system and to allocate resources to users.


Format

RUN SYS$SYSTEM:AUTHORIZE


Parameters

None.
Usage Summary To invoke AUTHORIZE, set your default device and directory to SYS$SYSTEM and enter RUN AUTHORIZE at the DCL command prompt. At the UAF> prompt, you can enter any AUTHORIZE command described in the following section.

To exit from AUTHORIZE, enter the EXIT command at the UAF> prompt or press Ctrl/Z.

If you move the SYSUAF.DAT file, be sure the logical name SYSUAF is defined and points to an existing file. If AUTHORIZE is unable to locate the SYSUAF.DAT file, it displays the following error message:


%UAF-E-NAOFIL, unable to open SYSUAF.DAT 
-RMS-E-FNF, file not found
Do you want to create a new file?

A response of YES results in creation of a new SYSUAF file containing a SYSTEM record and a DEFAULT record. These records are initialized with the same values set when the system was installed.

5.3 AUTHORIZE Commands

This section describes the AUTHORIZE commands and provides examples of their use. You can abbreviate any command, keyword, or qualifier as long as the abbreviation is not ambiguous. The asterisk (*) and the percent sign (%) can be used as wildcard characters to specify user names, node names, and UICs.

AUTHORIZE commands fall into the following four categories:

The following table summarizes the AUTHORIZE commands according to these categories.
Command Description
Managing System Resources and User Accounts with SYSUAF
ADD Adds a user record to the SYSUAF and corresponding identifiers to the rights database.
COPY Creates a new SYSUAF record that duplicates an existing record.
DEFAULT Modifies the default SYSUAF record.
LIST Writes reports for selected UAF records to a listing file, SYSUAF.LIS.
MODIFY Changes values in a SYSUAF user record. Qualifiers not specified in the command remain unchanged.
REMOVE Deletes a SYSUAF user record and corresponding identifiers in the rights database. The DEFAULT and SYSTEM records cannot be deleted.
RENAME Changes the user name of the SYSUAF record (and, if specified, the corresponding identifier) while retaining the characteristics of the old record.
SHOW Displays reports for selected SYSUAF records.
Managing Network Proxies with NETPROXY.DAT or NET$PROXY.DAT
ADD/PROXY Adds proxy access for the specified user.
CREATE/PROXY Creates a network proxy authorization file.
LIST/PROXY Creates a listing file of all proxy accounts and all remote users with proxy access to the accounts.
MODIFY/PROXY Modifies proxy access for the specified user.
REMOVE/PROXY Deletes proxy access for the specified user.
SHOW/PROXY Displays proxy access allowed for the specified user.
Managing Identifiers with RIGHTSLIST.DAT
ADD/IDENTIFIER Adds an identifier name to the rights database.
CREATE/RIGHTS Creates a new rights database file.
GRANT/IDENTIFIER Grants an identifier name to a UIC identifier.
LIST/IDENTIFIER Creates a listing file of identifier names and values.
LIST/RIGHTS Creates a listing file of all identifiers held by the specified user.
MODIFY/IDENTIFIER Modifies the named identifier in the rights database.
REMOVE/IDENTIFIER Removes an identifier from the rights database.
RENAME/IDENTIFIER Renames an identifier in the rights database.
REVOKE/IDENTIFIER Revokes an identifier name from a UIC identifier.
SHOW/IDENTIFIER Displays identifier names and values on the current output device.
SHOW/RIGHTS Displays on the current output device the names of all identifiers held by the specified user.
General Commands
EXIT Returns the user to DCL command level.
HELP Displays HELP text for AUTHORIZE commands.
MODIFY/SYSTEM_PASSWORD Sets the system password (equivalent to the DCL command SET PASSWORD/SYSTEM).

ADD

Adds a user record to the SYSUAF and corresponding identifiers to the rights database.

Format

ADD newusername


Parameter

newusername

Specifies the name of the user record to be included in the SYSUAF. The newusername parameter is a string of 1 to 12 alphanumeric characters and can contain underscores. Although dollar signs are permitted, they are usually reserved for system names.

Avoid using fully numeric user names (for example, 89560312). A fully numeric user name cannot receive a corresponding identifier because fully numeric identifiers are not permitted.


Qualifiers

/ACCESS[=(range[,...])]

Specifies hours of access for all modes of access. The syntax for specifying the range is:

/[NO]ACCESS=([PRIMARY], [n-m], [n], [,...],[SECONDARY], [n-m], [n], [,...]) 

Specify hours as integers from 0 to 23, inclusive. You can specify single hours (n) or ranges of hours (n-m). If the ending hour of a range is earlier than the starting hour, the range extends from the starting hour through midnight to the ending hour. The first set of hours after the keyword PRIMARY specifies hours on primary days; the second set of hours after the keyword SECONDARY specifies hours on secondary days. Note that hours are inclusive; that is, if you grant access during a given hour, access extends to the end of that hour.


Previous Next Contents Index

[Site home] [Send comments] [Help with this site] [How to order documentation] [OpenVMS site] [Compaq site]
[OpenVMS documentation]

Copyright © Compaq Computer Corporation 1998. All rights reserved.

Legal
6048PRO_008.HTML