HP manual User Profiles, Sentry.Users.Report

Page 81

SENTRY User’s Guide

Section 3 - 9

3.2 USER PROFILES

The SENTRY User Profile Report displays all parameters in effect for each user registered in your system. Additionally such information as the users name, department and telephone may be added to the system data.

 

 

SENTRY.USERS.REPORT

SENTRY User Details

12:15:01 08-08-00

 

 

 

 

 

 

 

 

User Name

User

 

 

Supplementary

Login Shell or

Home

Department

Login ID

uid

GID Name

Groups

 

Command

Directory

Telephone

======

===

==========

=============

===========

========

==========

adm

4

adm

adm

 

/bin/sh

/usr/adm

 

bee

201

users

users

 

/bin/sh

/users/fl_sales

Bee Fiore

bin

2

bin

bin

 

/bin/sh

/bin

 

daemon

1

daemon

daemon

 

/bin/sh

/

 

lewis

203

users

users

 

/bin/sh

/users/fl_data

Lewis Eckhoff

lewis1

203

users

 

 

/bin/sh

/users/fast.practice

 

lp

9

lp

lp

 

/bin/sh

/usr/spool/lp

 

peggy

0

users

users

 

/bin/sh

/users/peggy

Peggy Long

 

 

 

 

 

 

 

Office 123

 

 

 

 

 

 

 

1102

root

0

sys

root

 

/bin/sh

/

 

 

 

 

other

 

 

 

 

 

 

 

bin

 

 

 

 

 

 

 

users

 

 

 

 

 

 

 

sys

 

 

 

 

 

 

 

adm

 

 

 

 

 

 

 

daemon

 

 

 

 

 

 

 

mail

 

 

 

 

 

 

 

lp

 

 

 

 

 

 

 

piadm

 

 

 

 

9 records listed.

Figure 37 - This is an example of the User Profiles Report which displays the user’s ID, UID, GID name, list of supplementary groups, login shell, home directory, name, department, and telephone number.

In the following paragraphs, we will describe each column of the report.

User Login Id - This the ID which is entered to log into your UNIX system. Most UNIX systems use lower case characters for IDs.

Fitzgerald & Long

Image 81
Contents Sentry Page Table Of Contents Page Using this Guide Introduction Sentry User’s Guide Using the Screens Data Entry Conventions Mv sentry sentry.old Installing SentryUniVerse … /uv/bin InstallUniData … /udt/bin PI/open … /isys/binSentry Main MenuGetting Started Sentry is currently being run by user n SentrySentry Main Menu You must be a super-user to use SentryIntroduction Introducing the Main Menu Introduction Page Introducing the Database Creation and Validation Menu Database Creation and Valudation Menu Fitzgerald & Long DB.LOAD Upload User and Group Profiles from UnixSENTRY.DB.LOAD Batch Phantom SENTRY.FILE.LOAD Batch Create Database from File SystemValidation Validate the User Profile DatabaseSentry User’s Guide Fitzgerald & Long Sentry User’s Guide Fitzgerald & Long Page Introducing the Database Maintenance Menu Database Maintenance Fitzgerald & Long Maximum Command Length Maximum Startup Path Length System Profile MaintenancePasswd File Order Group File Order SYSTEM.MAINTFitzgerald & Long Sentry User’s Guide Fitzgerald & Long CUSTOM.USER Custom User Default Maintenance SUNEnter field number, File or ESC to exit USER.MAINT User MaintenanceUID GIDFitzgerald & Long Sentry User’s Guide SUN Enter field number, File or ESC to exit File Ownership Conflict Are you sure you want to delete the entire recordYES/NO?Jaf Enter ESC to quit Fitzgerald & Long GROUP.MAINT Group MaintenanceDo you want to update the Unix group file Y/N? File Group Conflict Sentry User’s GuideSection 2 Sentry User’s Guide File System FILE.MANAGERSysbckup View Group Execute XEQ View User Repaint CURSOR.MAINEnter name for cross reference FILE.MAINT Read permission w write permission x execute permission Do you want to update ALL files within this Directory also?ALL ACL.MAINTFitzgerald & Long Sentry User’s Guide Enter the user name or UID to view @ for X-ref More File Manager ViewsFILE.MANAGER Enter the group name or GID to view @ for X-ref COMMAND.MAINT Command MaintenanceSENTRY.COMMAND.CONTROL PROC.TEST ProcUse at database prompt only Both use at database prompt and from within a program Execute from inside a program onlyUnlimited use No useSentry User’s Guide USER.ITEM.MAINT User Item Protection MaintenanceSentry User’s GuideSection 2 Sentry User’s Guide Sentry User’s Guide Sentry User’s Guide Introducing the Reports Menu Sentry Reports MenuFitzgerald & Long System Profile Report Fitzgerald & Long Sentry User’s Guide Fitzgerald & Long Sentry User’s Guide SENTRY.USERS.REPORT User ProfilesSentry User’s Guide SENTRY.GROUPS.REPORT Groups ReportSentry User’s Guide None Account Protection ReportSENTRY.COMMANDS SENTRY.COMMANDS.REPORT Command Protection ReportThere are no prompts for this report SENTRY.VIOLATION.REPORT Access Violations ReportSentry User’s Guide Introducing the Utilities Menu Database Utilities MenuFitzgerald & Long Account Containing Protection VOC Protection SetupPuging the Violations LOG Sentry User’s Guide This is the Password Generation data entry screen Password CreationSentry User’s Guide Fitzgerald & Long REBUILD.INVERTS Rebuild Cross Reference FilesUpdate Protected Commands Page Sample Call @SENTRY.ENCRYPTDATA.STRING, RETURN.STRING Sentry Internal SubroutinesDATA.STRING Input RETURN.STRING OutputTHE.KEY Fudge Tastes Good ENCRYPTION.KEY InputTHE.KEY = Fudge Tastes Good Subroutine SENTRY.USER.ITEM.CONTROLERROR.TEXT Output ACCESS.RIGHTS OutputUSER.ITEM Input ITEM.FOUND OutputAppendix 1 Comment Input Subroutine SENTRY.VIOLATION.STAMPAppendix 1 Page Sentry KEY Bindings Appendix 2 Sentry User’s Guide Appendix 2