Document revision date: 19 July 1999
OpenVMS Guide to System Security
Previous
Contents
Index
E
Echoing, passwords and
Editing ACLs
Emergency accounts and privileges
Emulator
terminal
Encryption
Environmental factors in security
Environmental identifiers
conditionalizing general identifiers
example #1
example #2
example #3
Identifier ACEs and
Erase-on-allocate #1
Erase-on-allocate #2
Erase-on-delete #1
Erase-on-delete #2
C2 systems and
Erasing disks
Erasure patterns #1
Erasure patterns #2
Erasure patterns #3
Erasure patterns #4
Event tolerance and security levels
Execute access
files
global sections
granting through protection codes
Expiration
of account
of password #1
of password #2
of secondary password
password system messages #1
password system messages #2
/EXPIRATION qualifier
Expired passwords, system message
EXQUOTA privilege
EXTAUTH flag
External authentication
defining logical names
disabling when network is down
marking user accounts
NET PASSWORD command
password verification
setting a password
specifying SYS$SINGLE_SIGNON logical name bits
using the /LOCAL_PASSWORD qualifier
F
F$MODE lexical function
Facility identifiers
FAL (file access listener) recommendations
File browsers #1
File browsers #2
File browsers #3
File protection #1
File protection #2
File protection #3
auditing
C2 systems
DCL commands for
setting default ACLs
Files
access control through ACLs
access requirements #1
access requirements #2
access requirements #3
accessing
allocated disk blocks
by file identifier
adding ACEs for security auditing #1
adding ACEs for security auditing #2
applying an alarm to
as protected objects
assigning protection codes
assigning security profiles #1
assigning security profiles #2
assigning security profiles #3
auditing access to #1
auditing access to #2
auditing access to #3
changing security profiles
confidential, protecting
controlling access with Identifier ACEs
copying
from remote account
creating
dependency on directory ownership
requirements for
default protection
encrypting
erasing data from disks
events audited
exceptions to ownership rules
managing directory defaults
naming rules
optimizing security
owned by resource identifier #1
owned by resource identifier #2
owned by resource identifier #3
ownership rules
protecting data after deletion
protecting mail
protection required for proxy access
restoring default security elements
restoring default security profiles
security auditing and #1
security auditing and #2
security elements of #1
security elements of #2
setting default protection and ownership
sharing and exchanging in network environment #1
sharing and exchanging in network environment #2
sharing for a cluster system
transfers with MAIL
/FLAGS=CAPTIVE qualifier
/FLAGS=DISIMAGE qualifier
/FLAGS=DISMAIL qualifier
/FLAGS=DISNEWMAIL qualifier
/FLAGS=DISPWDDIC qualifier
/FLAGS=DISPWDHIS qualifier
/FLAGS=DISRECONNECT qualifier
/FLAGS=DISREPORT qualifier
/FLAGS=DISUSER qualifier
/FLAGS=DISWELCOME qualifier
/FLAGS=GENPWD qualifier #1
/FLAGS=GENPWD qualifier #2
/FLAGS=LOCKPWD qualifier
/FLAGS=PWD_EXPIRED qualifier
/FLAGS=RESTRICTED qualifier
Flush interval
Flushing messages to disk
Foreign volumes, access requirements
Formats
Identifier ACE
protection code
rights identifiers
security-auditing ACE
UIC (user identification code)
FYDRIVER, C2 systems and
G
General identifiers
design considerations
example #1
example #2
format
Generated passwords
disadvantages
example
initial passwords
length
minimum length
requiring #1
requiring #2
Global sections
default protection
events audited
group
privilege requirements #1
privilege requirements #2
reestablishing security profile
restricting access
security elements of
system
template profiles
types of access
Group accounts, C2 systems and
Group numbers
in UICs
reserved UICs
uniqueness requirement for clustered systems
Group numbers and passwords
setting up for cluster
GROUP privilege
Group UIC names
Group users (security category) #1
Group users (security category) #2
Groups
design of
guidelines for organization
UIC design
GRPNAM privilege #1
GRPNAM privilege #2
GRPNAM privilege #3
GRPPRV privilege
description
effect on protection mechanisms
giving rights of system user #1
giving rights of system user #2
giving rights of system user #3
granting control access
trusted users and
Guest accounts
as limited-access accounts
C2 systems and
Previous
Next
Contents
Index
privacy and legal statement
6346PRO_INDEX_002.HTML