HP Sentry manual Fitzgerald & Long

Page 27

SENTRY User’s Guide

Section 1 - 9

3. “Password for User XXXXX is less than N characters.” - The user “XXXXX” has a password which is shorter than the minimum password length specified in the SENTRY System Profile screen, which is N. This user’s password should be updated to conform to the minimum length restrictions you have instituted.

4.“User XXXXX has no home directory.” - The user “XXXXX” has no home directory specified. This would prevent the user from logging in, as UNIX would not know where to attach the user upon login. The user should be updated and assigned a home directory.

5.“User XXXXX has an invalid home directory - /ZZZZZ.”- The user “XXXXX” has a home directory in the SENTRY database of “/ZZZZZ”, but SENTRY cannot locate this directory on your file system. Perhaps the directory was removed after it was assigned as the user’s home directory. The user should be updated and assigned a valid home directory.

6.“Group XXXXX is not on the SENTRY.GROUPS file.” - A Group name was found in SENTRY’s control list which does not exist in the SENTRY.GROUPS file. This indicates that one of SENTRY’s database files is damaged and should be rebuilt. Upload the passwd and group files to fix this problem.

7.“Command XXXXX not on the SENTRY.COMMANDS file.” - A VOC protection item was found in SENTRY’s control list which does not exist in the SENTRY.COMMANDS file. This indicates that one of SENTRY’s database files is damaged and should be rebuilt.

Errors beginning with the word “Warning” are informational - not serious database issues but situations you should be aware of. The following is a list of those warnings.

1.“User XXXXX will default to “other” protection on all objects and commands.” - The user “XXXXX” is not specifically mentioned, either by user ID or group membership, in the permissions for any file system object or any VOC command protected by SENTRY. He will fall into the “other” category for all protection on the system. This is NOT a problem, but could serve as an indication of a user ID which is obsolete and no longer used.

2.“Group XXXXX is not used by any user.” - The group “XXXXX” is not being used by any user on the system. Therefore, no users will receive their access permissions via this group. This may be a group which is obsolete and should be removed or renamed.

3.“Group XXXXX is not used to protect any object or command.” - The group “XXXXX” is not referenced in the permissions for any disk object or any VOC command. It may be assigned to users, but is not used to protect anything. This might be an obsolete group which should be removed or renamed.

4.“Owner (UID) XXXXX on /ZZZZZ does not exist.” - The user ID number “XXXXX” is the owner of a disk object whose path is “/ZZZZZ”. However, there is no user who is assigned this user ID number. Possibly, there once was a user but he has been deleted. The owner for this disk object should be replaced with a valid user on the system. Alternatively, a new or existing user could be assigned the same user ID number (UID).

Fitzgerald & Long

Image 27
Contents Sentry Page Table Of Contents Page Using this Guide Introduction Sentry User’s Guide Using the Screens Data Entry Conventions Mv sentry sentry.old Installing SentryPI/open … /isys/bin InstallUniVerse … /uv/bin UniData … /udt/binSentry Main MenuGetting Started Sentry is currently being run by user n SentrySentry Main Menu You must be a super-user to use SentryIntroduction Introducing the Main Menu Introduction Page Introducing the Database Creation and Validation Menu Database Creation and Valudation Menu Fitzgerald & Long DB.LOAD Upload User and Group Profiles from UnixSENTRY.DB.LOAD Batch Phantom SENTRY.FILE.LOAD Batch Create Database from File SystemValidation Validate the User Profile DatabaseSentry User’s Guide Fitzgerald & Long Sentry User’s Guide Fitzgerald & Long Page Introducing the Database Maintenance Menu Database Maintenance Fitzgerald & Long SYSTEM.MAINT System Profile MaintenanceMaximum Command Length Maximum Startup Path Length Passwd File Order Group File OrderFitzgerald & Long Sentry User’s Guide Fitzgerald & Long CUSTOM.USER Custom User Default Maintenance SUNEnter field number, File or ESC to exit GID User MaintenanceUSER.MAINT UIDFitzgerald & Long Sentry User’s Guide SUN Enter field number, File or ESC to exit File Ownership Conflict Are you sure you want to delete the entire recordYES/NO?Jaf Enter ESC to quit Fitzgerald & Long GROUP.MAINT Group MaintenanceDo you want to update the Unix group file Y/N? File Group Conflict Sentry User’s GuideSection 2 Sentry User’s Guide File System FILE.MANAGERSysbckup View Group Execute XEQ View User Repaint CURSOR.MAINEnter name for cross reference FILE.MAINT Read permission w write permission x execute permission Do you want to update ALL files within this Directory also?ALL ACL.MAINTFitzgerald & Long Sentry User’s Guide Enter the user name or UID to view @ for X-ref More File Manager ViewsFILE.MANAGER Enter the group name or GID to view @ for X-ref PROC.TEST Proc Command MaintenanceCOMMAND.MAINT SENTRY.COMMAND.CONTROLUse at database prompt only No use Execute from inside a program onlyBoth use at database prompt and from within a program Unlimited useSentry User’s Guide USER.ITEM.MAINT User Item Protection MaintenanceSentry User’s GuideSection 2 Sentry User’s Guide Sentry User’s Guide Sentry User’s Guide Introducing the Reports Menu Sentry Reports MenuFitzgerald & Long System Profile Report Fitzgerald & Long Sentry User’s Guide Fitzgerald & Long Sentry User’s Guide SENTRY.USERS.REPORT User ProfilesSentry User’s Guide SENTRY.GROUPS.REPORT Groups ReportSentry User’s Guide None Account Protection ReportSENTRY.COMMANDS SENTRY.COMMANDS.REPORT Command Protection ReportThere are no prompts for this report SENTRY.VIOLATION.REPORT Access Violations ReportSentry User’s Guide Introducing the Utilities Menu Database Utilities MenuFitzgerald & Long Account Containing Protection VOC Protection SetupPuging the Violations LOG Sentry User’s Guide This is the Password Generation data entry screen Password CreationSentry User’s Guide Fitzgerald & Long REBUILD.INVERTS Rebuild Cross Reference FilesUpdate Protected Commands Page RETURN.STRING Output Sentry Internal SubroutinesSample Call @SENTRY.ENCRYPTDATA.STRING, RETURN.STRING DATA.STRING InputTHE.KEY Fudge Tastes Good ENCRYPTION.KEY InputTHE.KEY = Fudge Tastes Good Subroutine SENTRY.USER.ITEM.CONTROLITEM.FOUND Output ACCESS.RIGHTS OutputERROR.TEXT Output USER.ITEM InputAppendix 1 Comment Input Subroutine SENTRY.VIOLATION.STAMPAppendix 1 Page Sentry KEY Bindings Appendix 2 Sentry User’s Guide Appendix 2