Document revision date: 30 March 2001
[Compaq] [Go to the documentation home page] [How to order documentation] [Help on this site] [How to contact us]
[OpenVMS documentation]

OpenVMS Programming Concepts Manual


Previous Contents Index

Chapter 29
29 Using the Distributed Transaction Manager
     29.1     Introduction to DECdtm Services
         29.1.1         Sample Atomic Transaction
         29.1.2         Transaction Participants
         29.1.3         DECdtm System Services
         29.1.4         Default Transactions
     29.2     Calling DECdtm System Services
     29.3     Using DECdtm Services: An Example
Chapter 30
30 Creating User-Written System Services
     30.1     Overview
     30.2     Writing a Privileged Routine (User-Written System Service)
     30.3     Creating a Privileged Shareable Image (VAX Only)
         30.3.1         Creating User-Written Dispatch Routines on VAX Systems
         30.3.2         Creating a PLV on VAX Systems
         30.3.3         Declaring Privileged Routines as Universal Symbols Using Transfer Vectors on VAX Systems
     30.4     Creating a User-Written System Service (Alpha Only)
         30.4.1         Creating a PLV on Alpha Systems
         30.4.2         Declaring Privileged Routines as Universal Symbols Using Symbol Vectors on Alpha Systems
Chapter 31
31 System Security Services
     31.1     Overview of the Operating System's Protection Scheme
     31.2     Identifiers
         31.2.1         Identifier Format
         31.2.2         General Identifiers
         31.2.3         System-Defined Identifiers
         31.2.4         UIC Identifiers
         31.2.5         Facility Identifiers
         31.2.6         Identifier Attributes
     31.3     Rights Database
         31.3.1         Initializing a Rights Database
         31.3.2         Using System Services to Affect a Rights Database
             31.3.2.1             Translating Identifier Values and Identifier Names
             31.3.2.2             Adding Identifiers and Holders to the Rights Database
             31.3.2.3             Determining Holders of Identifiers
             31.3.2.4             Determining Identifiers Held by a Holder
             31.3.2.5             Modifying the Identifier Record
             31.3.2.6             Modifying a Holder Record
             31.3.2.7             Removing Identifiers and Holders from the Rights Database
         31.3.3         Search Operations
         31.3.4         Modifying a Rights List
     31.4     Persona (Alpha Only1)
         31.4.1         Impersonation Services (Alpha Only)
             31.4.1.1             Using Impersonation System Services
         31.4.2         Per-Thread Security (Alpha Only)
             31.4.2.1             Previous Security Model
             31.4.2.2             Per-Thread Security Model
         31.4.3         Persona Extensions (Alpha Only)
     31.5     Managing Object Protection
         31.5.1         Protected Objects
         31.5.2         Object Security Profile
             31.5.2.1             Displaying the Security Profile
             31.5.2.2             Modifying the Security Profile
         31.5.3         Types of Access Control Entries
             31.5.3.1             Design Considerations
             31.5.3.2             Translating ACEs
             31.5.3.3             Creating and Maintaining ACEs
     31.6     Protected Subsystems
     31.7     Security Auditing
     31.8     Checking Access Protection
         31.8.1         Creating a Security Profile
         31.8.2         SYS$CHKPRO System Sevice
         31.8.3         SYS$CHECK_ACCESS System Service
     31.9     SYS$CHECK_PRIVILEGE
     31.10     Implementing Site-Specific Security Policies
         31.10.1         Creating Loadable Security Services
             31.10.1.1             Preparing and Loading a System Service
             31.10.1.2             Removing an Executive Loaded Image
         31.10.2         Installing Filters for Site-Specific Password Policies
             31.10.2.1             Creating a Shareable Image
             31.10.2.2             Installing a Shareable Image
Chapter 32
32 Logical Name and Logical Name Tables
     32.1     Logical Name System Services and DCL Commands
         32.1.1         Logical Names, Equivalence Names, and Search Lists
         32.1.2         Logical Name Tables
             32.1.2.1             Logical Name Directory Tables
             32.1.2.2             Process, Job, Group, System and Clusterwide Default Logical Name Tables
                 32.1.2.2.1                 Process Logical Name Table
                 32.1.2.2.2                 Job Logical Name Table
                 32.1.2.2.3                 Group Logical Name Table
                 32.1.2.2.4                 System Logical Name Table
                 32.1.2.2.5                 Clusterwide Logical Name Table
         32.1.3         Logical Name Table Names and Search Lists
         32.1.4         Specifying the Logical Name Table Search List
     32.2     Creating User-Defined and Clusterwide Logical Name Tables
         32.2.1         Creating Clusterwide Logical Name Tables
     32.3     Checking Access and Protection
     32.4     Specifying Access Modes
     32.5     Translating Logical Names
     32.6     Specifying Attributes
     32.7     Establishing Logical Name Table Quotas
         32.7.1         Directory Table Quotas
         32.7.2         Default Logical Name Table Quotas
         32.7.3         Job Logical Name Table Quotas
         32.7.4         User-Defined Logical Name Table Quotas
     32.8     Interprocess Communication
     32.9     Using Logical Name and Equivalence Name Format Conventions
     32.10     Using Logical Names and Logical Name Table System Services in Programs
         32.10.1         Using SYS$CRELNM to Create a Logical Name
         32.10.2         Using SYS$CRELNT to Create Logical Name Tables
         32.10.3         Using SYS$DELLNM to Delete Logical Names
         32.10.4         Using SYS$TRNLNM to Translate Logical Names
         32.10.5         Using SYS$CRELNM, SYS$TRNLNM, and SYS$DELLNM in a Program Example


Previous Next Contents Index

  [Go to the documentation home page] [How to order documentation] [Help on this site] [How to contact us]  
  privacy and legal statement  
5841PRO_CONTENTS_009.HTML