HP Sentry manual Account Protection Report, None

Page 85

SENTRY User’s Guide

Section 3 - 13

3.4 ACCOUNT PROTECTION REPORT

This is a report of all protected commands on your system. It is sorted by account such that there is one page per account printed. Note that the account pathname appears in the title of the report.

SENTRY.ACCOUNTS.REPORT Commands Protected in Account /users/jeff as of 12:16:19 08-08-00

Commands:

 

 

 

 

 

Verbs, Sent, Menu,

 

 

Group Name

User Name

Other

PA or PQ

Type

Description

& Rights

& Rights

Rights

==============

====

=================

=============

==========

=====

DELETE

V

Verb to DELETE

users : U

peggy : ALL

NONE

 

 

records from a FILE

 

root : ALL

 

 

 

 

 

 

 

 

 

adm : ALL

lewis : U

 

 

 

 

piadm : ALL

lewis1 : U

 

 

 

 

 

 

ED

V

Verb to invoke the

users : U

peggy : ALL

NONE

 

 

Pi/open editor

 

root : ALL

 

 

 

 

 

 

 

 

 

adm : ALL

lewis : U

 

 

 

 

piadm : ALL

lewis1 : U

 

 

 

 

 

 

MODIFY

V

Verb to invoke the

piadm : ALL

peggy : ALL

NONE

 

 

cursor control-

 

 

 

dependent data entry processor

root : ALL

3 records listed.

Figure 39 - This is an example of the Account Protection Report. Each account is listed on a separate page. All protected commands for an account are presented in alphabetical order.

The following paragraphs describe the fields presented on the report and shown in Figure 39.

Commands - This is the name of the command as it appears in the VOC of the account. It may be the name of a verb, sentence, paragraph, PROC, or menu.

Type - This field indicates if the command is a (V)erb, (S)entence, (P)aragraph, (PQ) PROC, or (M)enu. Note that the examples presented in our report are verbs and one PROC.

Fitzgerald & Long

Image 85
Contents Sentry Page Table Of Contents Page Using this Guide Introduction Sentry User’s Guide Using the Screens Data Entry Conventions Mv sentry sentry.old Installing SentryUniVerse … /uv/bin InstallUniData … /udt/bin PI/open … /isys/binSentry Main MenuGetting Started Sentry is currently being run by user n SentrySentry Main Menu You must be a super-user to use SentryIntroduction Introducing the Main Menu Introduction Page Introducing the Database Creation and Validation Menu Database Creation and Valudation Menu Fitzgerald & Long DB.LOAD Upload User and Group Profiles from UnixSENTRY.DB.LOAD Batch Phantom SENTRY.FILE.LOAD Batch Create Database from File SystemValidation Validate the User Profile DatabaseSentry User’s Guide Fitzgerald & Long Sentry User’s Guide Fitzgerald & Long Page Introducing the Database Maintenance Menu Database Maintenance Fitzgerald & Long Maximum Command Length Maximum Startup Path Length System Profile MaintenancePasswd File Order Group File Order SYSTEM.MAINTFitzgerald & Long Sentry User’s Guide Fitzgerald & Long CUSTOM.USER Custom User Default Maintenance SUNEnter field number, File or ESC to exit USER.MAINT User MaintenanceUID GIDFitzgerald & Long Sentry User’s Guide SUN Enter field number, File or ESC to exit File Ownership Conflict Are you sure you want to delete the entire recordYES/NO?Jaf Enter ESC to quit Fitzgerald & Long GROUP.MAINT Group MaintenanceDo you want to update the Unix group file Y/N? File Group Conflict Sentry User’s GuideSection 2 Sentry User’s Guide FILE.MANAGER File SystemSysbckup View Group Execute XEQ View User Repaint CURSOR.MAINEnter name for cross reference FILE.MAINT Read permission w write permission x execute permission Do you want to update ALL files within this Directory also?ALL ACL.MAINTFitzgerald & Long Sentry User’s Guide Enter the user name or UID to view @ for X-ref More File Manager ViewsFILE.MANAGER Enter the group name or GID to view @ for X-ref COMMAND.MAINT Command MaintenanceSENTRY.COMMAND.CONTROL PROC.TEST ProcUse at database prompt only Both use at database prompt and from within a program Execute from inside a program onlyUnlimited use No useSentry User’s Guide USER.ITEM.MAINT User Item Protection MaintenanceSentry User’s GuideSection 2 Sentry User’s Guide Sentry User’s Guide Sentry User’s Guide Introducing the Reports Menu Sentry Reports MenuFitzgerald & Long System Profile Report Fitzgerald & Long Sentry User’s Guide Fitzgerald & Long Sentry User’s Guide SENTRY.USERS.REPORT User Profiles Sentry User’s Guide SENTRY.GROUPS.REPORT Groups ReportSentry User’s Guide None Account Protection ReportSENTRY.COMMANDS SENTRY.COMMANDS.REPORT Command Protection ReportThere are no prompts for this report SENTRY.VIOLATION.REPORT Access Violations ReportSentry User’s Guide Introducing the Utilities Menu Database Utilities MenuFitzgerald & Long Account Containing Protection VOC Protection SetupPuging the Violations LOG Sentry User’s Guide This is the Password Generation data entry screen Password CreationSentry User’s Guide Fitzgerald & Long REBUILD.INVERTS Rebuild Cross Reference FilesUpdate Protected Commands Page Sample Call @SENTRY.ENCRYPTDATA.STRING, RETURN.STRING Sentry Internal SubroutinesDATA.STRING Input RETURN.STRING OutputTHE.KEY Fudge Tastes Good ENCRYPTION.KEY InputTHE.KEY = Fudge Tastes Good Subroutine SENTRY.USER.ITEM.CONTROLERROR.TEXT Output ACCESS.RIGHTS OutputUSER.ITEM Input ITEM.FOUND OutputAppendix 1 Comment Input Subroutine SENTRY.VIOLATION.STAMPAppendix 1 Page Sentry KEY Bindings Appendix 2 Sentry User’s Guide Appendix 2