HP Sentry manual Table Of Contents

Page 3

Table Of Contents

USING THIS GUIDE----------------------------------------------------------------------------------------

Intro - 1

USING THE SCREENS ------------------------------------------------------------------------------------

Intro - 3

INSTALLING SENTRY ------------------------------------------------------------------------------------

Intro - 5

GETTING STARTED ---------------------------------------------------------------------------------------

Intro - 8

INTRODUCING THE MAIN MENU ------------------------------------------------------------------

Intro - 12

1. INTRODUCING THE DATABASE CREATION AND VALIDATION MENU-----------

1 - 1

1.0

DATABASE CREATION AND VALUDATION MENU -------------------------------------------

1

- 2

1.1

UPLOAD USER AND GROUP PROFILES FROM UNIX -----------------------------------------

1

- 4

1.2

CREATE DATABASE FROM FILE SYSTEM ------------------------------------------------------

1

- 6

1.3

VALIDATE THE USER PROFILE DATABASE ----------------------------------------------------

1

- 7

2. INTRODUCING THE DATABASE MAINTENANCE MENU --------------------------------

2

- 1

2.0

DATABASE MAINTENANCE--------------------------------------------------------------------------

2

- 2

2.1

SYSTEM PROFILE MAINTENANCE ----------------------------------------------------------------

2

- 4

2.2

USER MAINTENANCE ---------------------------------------------------------------------------------

2 - 10

2.3

GROUP MAINTENANCE-------------------------------------------------------------------------------

2 - 18

2.4

FILE SYSTEM---------------------------------------------------------------------------------------------

2 - 23

ACLs Maintenance -------------------------------------------------------------------------------------------

2 - 28

More File Manager Views ----------------------------------------------------------------------------------

2 - 31

2.5

COMMAND MAINTENANCE-------------------------------------------------------------------------

2 - 34

2.6

USER ITEM PROTECTION MAINTENANCE-----------------------------------------------------

2 - 38

3. INTRODUCING THE REPORTS MENU --------------------------------------------------------------

3

- 1

3.0

REPORTS MENU------------------------------------------------------------------------------------------

3

- 2

3.1

SYSTEM PROFILE REPORT ---------------------------------------------------------------------------

3

- 4

3.2

USER PROFILES ------------------------------------------------------------------------------------------

3

- 9

3.3

GROUPS REPORT ---------------------------------------------------------------------------------------

3 - 11

3.4

ACCOUNT PROTECTION REPORT-----------------------------------------------------------------

3 - 13

3.5

COMMAND PROTECTION REPORT ---------------------------------------------------------------

3 - 15

3.6

ACCESS VIOLATIONS REPORT---------------------------------------------------------------------

3 - 17

4. INTRODUCING THE UTILITIES MENU -------------------------------------------------------------

4

- 1

4.0

UTILITIES MENU -----------------------------------------------------------------------------------------

4

- 2

4.1

VOC PROTECTION SETUP ----------------------------------------------------------------------------

4

- 4

4.2

PUGING THE VIOLATIONS LOG --------------------------------------------------------------------

4

- 5

4.3

PASSWORD CREATION --------------------------------------------------------------------------------

4

- 7

4.4

REBUILD CROSS REFERENCE FILES -------------------------------------------------------------

4 - 10

4.5

UPDATE PROTECTED COMMANDS---------------------------------------------------------------

4 - 11

APPENDIX 1 ---------------------------------------------------------------------------------------------

Appendix - 1

SENTRY INTERNAL SUBROUTINES-----------------------------------------------------------

Appendix - 1

Subroutine: SENTRY.ENCRYPT------------------------------------------------------------------

Appendix - 1

DATA ENCRYPTION-------------------------------------------------------------------------------

Appendix - 2

Subroutine: SENTRY.USER.ITEM.CONTROL-------------------------------------------------

Appendix - 3

Subroutine: SENTRY.VIOLATION.STAMP-----------------------------------------------------

Appendix - 6

APPENDIX 2 ------------------------------------------------------------------------------------------

Appendix

2 - 1

SENTRY KEY BINDINGS ------------------------------------------------------------------------

Appendix 2 - 1

Image 3
Contents Sentry Page Table Of Contents Page Using this Guide Introduction Sentry User’s Guide Using the Screens Data Entry Conventions Mv sentry sentry.old Installing SentryPI/open … /isys/bin InstallUniVerse … /uv/bin UniData … /udt/binSentry Main MenuGetting Started Sentry is currently being run by user n SentrySentry Main Menu You must be a super-user to use SentryIntroduction Introducing the Main Menu Introduction Page Introducing the Database Creation and Validation Menu Database Creation and Valudation Menu Fitzgerald & Long DB.LOAD Upload User and Group Profiles from UnixSENTRY.DB.LOAD Batch Phantom SENTRY.FILE.LOAD Batch Create Database from File SystemValidation Validate the User Profile DatabaseSentry User’s Guide Fitzgerald & Long Sentry User’s Guide Fitzgerald & Long Page Introducing the Database Maintenance Menu Database Maintenance Fitzgerald & Long SYSTEM.MAINT System Profile MaintenanceMaximum Command Length Maximum Startup Path Length Passwd File Order Group File OrderFitzgerald & Long Sentry User’s Guide Fitzgerald & Long CUSTOM.USER Custom User Default Maintenance SUNEnter field number, File or ESC to exit GID User MaintenanceUSER.MAINT UIDFitzgerald & Long Sentry User’s Guide SUN Enter field number, File or ESC to exit File Ownership Conflict Are you sure you want to delete the entire recordYES/NO?Jaf Enter ESC to quit Fitzgerald & Long GROUP.MAINT Group MaintenanceDo you want to update the Unix group file Y/N? File Group Conflict Sentry User’s GuideSection 2 Sentry User’s Guide File System FILE.MANAGERSysbckup View Group Execute XEQ View User Repaint CURSOR.MAINEnter name for cross reference FILE.MAINT Read permission w write permission x execute permission Do you want to update ALL files within this Directory also?ALL ACL.MAINTFitzgerald & Long Sentry User’s Guide Enter the user name or UID to view @ for X-ref More File Manager ViewsFILE.MANAGER Enter the group name or GID to view @ for X-ref PROC.TEST Proc Command MaintenanceCOMMAND.MAINT SENTRY.COMMAND.CONTROLUse at database prompt only No use Execute from inside a program onlyBoth use at database prompt and from within a program Unlimited useSentry User’s Guide USER.ITEM.MAINT User Item Protection MaintenanceSentry User’s GuideSection 2 Sentry User’s Guide Sentry User’s Guide Sentry User’s Guide Introducing the Reports Menu Sentry Reports MenuFitzgerald & Long System Profile Report Fitzgerald & Long Sentry User’s Guide Fitzgerald & Long Sentry User’s Guide SENTRY.USERS.REPORT User ProfilesSentry User’s Guide SENTRY.GROUPS.REPORT Groups ReportSentry User’s Guide None Account Protection ReportSENTRY.COMMANDS SENTRY.COMMANDS.REPORT Command Protection ReportThere are no prompts for this report SENTRY.VIOLATION.REPORT Access Violations ReportSentry User’s Guide Introducing the Utilities Menu Database Utilities MenuFitzgerald & Long Account Containing Protection VOC Protection SetupPuging the Violations LOG Sentry User’s Guide This is the Password Generation data entry screen Password CreationSentry User’s Guide Fitzgerald & Long REBUILD.INVERTS Rebuild Cross Reference FilesUpdate Protected Commands Page RETURN.STRING Output Sentry Internal SubroutinesSample Call @SENTRY.ENCRYPTDATA.STRING, RETURN.STRING DATA.STRING InputTHE.KEY Fudge Tastes Good ENCRYPTION.KEY InputTHE.KEY = Fudge Tastes Good Subroutine SENTRY.USER.ITEM.CONTROLITEM.FOUND Output ACCESS.RIGHTS OutputERROR.TEXT Output USER.ITEM InputAppendix 1 Comment Input Subroutine SENTRY.VIOLATION.STAMPAppendix 1 Page Sentry KEY Bindings Appendix 2 Sentry User’s Guide Appendix 2