HP Sentry manual Introducing the Database Creation and Validation Menu

Page 19

SENTRY User’s Guide

Section 1 - 1

1.INTRODUCING THE DATABASE CREATION AND VALIDATION MENU

The first selection of SENTRY's Main Menu is Database Creation and Validation. This menu provides access to programs which will build SENTRY’s database from your existing user, group and file system data.

SENTRY

Main Menu

07 AUG 2000

1.Database Creation and Validation Menu

2.Database Maintenance Menu

3.Reports Menu

4.Utilities Menu

Please select one of the above: 1

Figure 5 - Database Creation and Validation is the first selection on the Main Menu.

These programs provide a quick and easy way to document your existing system. Because all of the data are loaded into SENTRY's database, comprehensive reports are available. Additionally, These programs simplify most of the data entry tasks usually associated with setting up a new security system.

Complimentary to the programs which build the SENTRY database is a program to evaluate the consistency of usage in groups, users, and permissions.

The three selections in the Database Creation and Validation Menu are the first three steps you should take after installing SENTRY. The following sections provide detailed descriptions on how, when and why these programs are used.

Fitzgerald & Long

Image 19
Contents Sentry Page Table Of Contents Page Using this Guide Introduction Sentry User’s Guide Using the Screens Data Entry Conventions Mv sentry sentry.old Installing SentryPI/open … /isys/bin InstallUniVerse … /uv/bin UniData … /udt/binSentry Main MenuGetting Started Sentry is currently being run by user n SentrySentry Main Menu You must be a super-user to use SentryIntroduction Introducing the Main Menu Introduction Page Introducing the Database Creation and Validation Menu Database Creation and Valudation Menu Fitzgerald & Long DB.LOAD Upload User and Group Profiles from UnixSENTRY.DB.LOAD Batch Phantom SENTRY.FILE.LOAD Batch Create Database from File SystemValidation Validate the User Profile DatabaseSentry User’s Guide Fitzgerald & Long Sentry User’s Guide Fitzgerald & Long Page Introducing the Database Maintenance Menu Database Maintenance Fitzgerald & Long SYSTEM.MAINT System Profile MaintenanceMaximum Command Length Maximum Startup Path Length Passwd File Order Group File OrderFitzgerald & Long Sentry User’s Guide Fitzgerald & Long CUSTOM.USER Custom User Default Maintenance SUNEnter field number, File or ESC to exit GID User MaintenanceUSER.MAINT UIDFitzgerald & Long Sentry User’s Guide SUN Enter field number, File or ESC to exit File Ownership Conflict Are you sure you want to delete the entire recordYES/NO?Jaf Enter ESC to quit Fitzgerald & Long GROUP.MAINT Group MaintenanceDo you want to update the Unix group file Y/N? File Group Conflict Sentry User’s GuideSection 2 Sentry User’s Guide FILE.MANAGER File SystemSysbckup View Group Execute XEQ View User Repaint CURSOR.MAINEnter name for cross reference FILE.MAINT Read permission w write permission x execute permission Do you want to update ALL files within this Directory also?ALL ACL.MAINTFitzgerald & Long Sentry User’s Guide Enter the user name or UID to view @ for X-ref More File Manager ViewsFILE.MANAGER Enter the group name or GID to view @ for X-ref PROC.TEST Proc Command MaintenanceCOMMAND.MAINT SENTRY.COMMAND.CONTROLUse at database prompt only No use Execute from inside a program onlyBoth use at database prompt and from within a program Unlimited useSentry User’s Guide USER.ITEM.MAINT User Item Protection MaintenanceSentry User’s GuideSection 2 Sentry User’s Guide Sentry User’s Guide Sentry User’s Guide Introducing the Reports Menu Sentry Reports MenuFitzgerald & Long System Profile Report Fitzgerald & Long Sentry User’s Guide Fitzgerald & Long Sentry User’s Guide SENTRY.USERS.REPORT User ProfilesSentry User’s Guide SENTRY.GROUPS.REPORT Groups ReportSentry User’s Guide None Account Protection ReportSENTRY.COMMANDS SENTRY.COMMANDS.REPORT Command Protection ReportThere are no prompts for this report SENTRY.VIOLATION.REPORT Access Violations ReportSentry User’s Guide Introducing the Utilities Menu Database Utilities MenuFitzgerald & Long Account Containing Protection VOC Protection SetupPuging the Violations LOG Sentry User’s Guide This is the Password Generation data entry screen Password CreationSentry User’s Guide Fitzgerald & Long REBUILD.INVERTS Rebuild Cross Reference FilesUpdate Protected Commands Page RETURN.STRING Output Sentry Internal SubroutinesSample Call @SENTRY.ENCRYPTDATA.STRING, RETURN.STRING DATA.STRING InputTHE.KEY Fudge Tastes Good ENCRYPTION.KEY InputTHE.KEY = Fudge Tastes Good Subroutine SENTRY.USER.ITEM.CONTROLITEM.FOUND Output ACCESS.RIGHTS OutputERROR.TEXT Output USER.ITEM InputAppendix 1 Comment Input Subroutine SENTRY.VIOLATION.STAMPAppendix 1 Page Sentry KEY Bindings Appendix 2 Sentry User’s Guide Appendix 2