Document revision date: 19 July 1999
[Compaq] [Go to the documentation home page] [How to order documentation] [Help on this site] [How to contact us]
[OpenVMS documentation]

OpenVMS Guide to System Security


Previous Contents Index

E
Echoing, passwords and
Editing ACLs
Emergency accounts and privileges
Emulator
    terminal
Encryption
Environmental factors in security
Environmental identifiers
    conditionalizing general identifiers
    example #1
    example #2
    example #3
    Identifier ACEs and
Erase-on-allocate #1
Erase-on-allocate #2
Erase-on-delete #1
Erase-on-delete #2
    C2 systems and
Erasing disks
Erasure patterns #1
Erasure patterns #2
Erasure patterns #3
Erasure patterns #4
Event tolerance and security levels
Execute access
    files
    global sections
    granting through protection codes
Expiration
    of account
    of password #1
    of password #2
    of secondary password
    password system messages #1
    password system messages #2
/EXPIRATION qualifier
Expired passwords, system message
EXQUOTA privilege
EXTAUTH flag
External authentication
    defining logical names
    disabling when network is down
    marking user accounts
    NET PASSWORD command
    password verification
    setting a password
    specifying SYS$SINGLE_SIGNON logical name bits
    using the /LOCAL_PASSWORD qualifier
F
F$MODE lexical function
Facility identifiers
FAL (file access listener) recommendations
File browsers #1
File browsers #2
File browsers #3
File protection #1
File protection #2
File protection #3
    auditing
    C2 systems
    DCL commands for
    setting default ACLs
Files
    access control through ACLs
    access requirements #1
    access requirements #2
    access requirements #3
    accessing
        allocated disk blocks
        by file identifier
    adding ACEs for security auditing #1
    adding ACEs for security auditing #2
    applying an alarm to
    as protected objects
    assigning protection codes
    assigning security profiles #1
    assigning security profiles #2
    assigning security profiles #3
    auditing access to #1
    auditing access to #2
    auditing access to #3
    changing security profiles
    confidential, protecting
    controlling access with Identifier ACEs
    copying
        from remote account
    creating
        dependency on directory ownership
        requirements for
    default protection
    encrypting
    erasing data from disks
    events audited
    exceptions to ownership rules
    managing directory defaults
    naming rules
    optimizing security
    owned by resource identifier #1
    owned by resource identifier #2
    owned by resource identifier #3
    ownership rules
    protecting data after deletion
    protecting mail
    protection required for proxy access
    restoring default security elements
    restoring default security profiles
    security auditing and #1
    security auditing and #2
    security elements of #1
    security elements of #2
    setting default protection and ownership
    sharing and exchanging in network environment #1
    sharing and exchanging in network environment #2
    sharing for a cluster system
    transfers with MAIL
/FLAGS=CAPTIVE qualifier
/FLAGS=DISIMAGE qualifier
/FLAGS=DISMAIL qualifier
/FLAGS=DISNEWMAIL qualifier
/FLAGS=DISPWDDIC qualifier
/FLAGS=DISPWDHIS qualifier
/FLAGS=DISRECONNECT qualifier
/FLAGS=DISREPORT qualifier
/FLAGS=DISUSER qualifier
/FLAGS=DISWELCOME qualifier
/FLAGS=GENPWD qualifier #1
/FLAGS=GENPWD qualifier #2
/FLAGS=LOCKPWD qualifier
/FLAGS=PWD_EXPIRED qualifier
/FLAGS=RESTRICTED qualifier
Flush interval
Flushing messages to disk
Foreign volumes, access requirements
Formats
    Identifier ACE
    protection code
    rights identifiers
    security-auditing ACE
    UIC (user identification code)
FYDRIVER, C2 systems and
G
General identifiers
    design considerations
    example #1
    example #2
    format
Generated passwords
    disadvantages
    example
    initial passwords
    length
    minimum length
    requiring #1
    requiring #2
Global sections
    default protection
    events audited
    group
    privilege requirements #1
    privilege requirements #2
    reestablishing security profile
    restricting access
    security elements of
    system
    template profiles
    types of access
Group accounts, C2 systems and
Group numbers
    in UICs
    reserved UICs
    uniqueness requirement for clustered systems
Group numbers and passwords
    setting up for cluster
GROUP privilege
Group UIC names
Group users (security category) #1
Group users (security category) #2
Groups
    design of
    guidelines for organization
    UIC design
GRPNAM privilege #1
GRPNAM privilege #2
GRPNAM privilege #3
GRPPRV privilege
    description
    effect on protection mechanisms
    giving rights of system user #1
    giving rights of system user #2
    giving rights of system user #3
    granting control access
    trusted users and
Guest accounts
    as limited-access accounts
    C2 systems and


Previous Next Contents Index

  [Go to the documentation home page] [How to order documentation] [Help on this site] [How to contact us]  
  privacy and legal statement  
6346PRO_INDEX_002.HTML