HP Sentry manual Introducing the Utilities Menu

Page 91

SENTRY User’s Guide

Section 4 - 1

4. INTRODUCING THE UTILITIES MENU

The Utilities Menu is executed through selection four on the SENTRY Main Menu. The programs provided in this selection are ancillary to the job of providing sound, well documented system security. These utility programs offer conveniences such as duplicating the protection from one account to another, purging the Violations Log, and generating new passwords.

SENTRY

Main Menu

07 AUG 2000

1.Database Creation and Validation Menu

2.Database Maintenance Menu

3.Reports Menu

4.Utilities Menu

Please select one of the above: 4

Figure 42 - Using the fourth selection on the Main Menu, you may invoke the Utilities Menu.

Through the five utility programs offered in the Utilities Menu you may make a number of "global" changes with little effort. These programs are provided as a convenience for the System Administrator who frequently needs to perform certain tasks on a system-wide basis.

One program provides you with the convenience of duplicating all of the Database Command security from one account to another, saving data entry time.

You may use our utility program to purge the Violations Log on a selective basis. Our password generation program will generate new passwords for all users using the standard specified in the System Profile for length and format. A special report is available to assist the System Administrator in notifying users of the changes.

Should SENTRY’s cross reference files become damaged, you can easily rebuild them through this menu. Additionally, we have provided a utility to “re-install” SENTRY’s command protection on an account.

Fitzgerald & Long

Image 91
Contents Sentry Page Table Of Contents Page Using this Guide Introduction Sentry User’s Guide Using the Screens Data Entry Conventions Mv sentry sentry.old Installing SentryPI/open … /isys/bin InstallUniVerse … /uv/bin UniData … /udt/binSentry Main MenuGetting Started Sentry is currently being run by user n SentrySentry Main Menu You must be a super-user to use SentryIntroduction Introducing the Main Menu Introduction Page Introducing the Database Creation and Validation Menu Database Creation and Valudation Menu Fitzgerald & Long DB.LOAD Upload User and Group Profiles from UnixSENTRY.DB.LOAD Batch Phantom SENTRY.FILE.LOAD Batch Create Database from File SystemValidation Validate the User Profile DatabaseSentry User’s Guide Fitzgerald & Long Sentry User’s Guide Fitzgerald & Long Page Introducing the Database Maintenance Menu Database Maintenance Fitzgerald & Long SYSTEM.MAINT System Profile MaintenanceMaximum Command Length Maximum Startup Path Length Passwd File Order Group File OrderFitzgerald & Long Sentry User’s Guide Fitzgerald & Long CUSTOM.USER Custom User Default Maintenance SUNEnter field number, File or ESC to exit GID User MaintenanceUSER.MAINT UIDFitzgerald & Long Sentry User’s Guide SUN Enter field number, File or ESC to exit File Ownership Conflict Are you sure you want to delete the entire recordYES/NO?Jaf Enter ESC to quit Fitzgerald & Long GROUP.MAINT Group MaintenanceDo you want to update the Unix group file Y/N? File Group Conflict Sentry User’s GuideSection 2 Sentry User’s Guide FILE.MANAGER File SystemSysbckup View Group Execute XEQ View User Repaint CURSOR.MAINEnter name for cross reference FILE.MAINT Read permission w write permission x execute permission Do you want to update ALL files within this Directory also?ALL ACL.MAINTFitzgerald & Long Sentry User’s Guide Enter the user name or UID to view @ for X-ref More File Manager ViewsFILE.MANAGER Enter the group name or GID to view @ for X-ref PROC.TEST Proc Command MaintenanceCOMMAND.MAINT SENTRY.COMMAND.CONTROLUse at database prompt only No use Execute from inside a program onlyBoth use at database prompt and from within a program Unlimited useSentry User’s Guide USER.ITEM.MAINT User Item Protection MaintenanceSentry User’s GuideSection 2 Sentry User’s Guide Sentry User’s Guide Sentry User’s Guide Introducing the Reports Menu Sentry Reports MenuFitzgerald & Long System Profile Report Fitzgerald & Long Sentry User’s Guide Fitzgerald & Long Sentry User’s Guide SENTRY.USERS.REPORT User ProfilesSentry User’s Guide SENTRY.GROUPS.REPORT Groups ReportSentry User’s Guide None Account Protection ReportSENTRY.COMMANDS SENTRY.COMMANDS.REPORT Command Protection Report There are no prompts for this report SENTRY.VIOLATION.REPORT Access Violations ReportSentry User’s Guide Introducing the Utilities Menu Database Utilities MenuFitzgerald & Long Account Containing Protection VOC Protection SetupPuging the Violations LOG Sentry User’s Guide This is the Password Generation data entry screen Password CreationSentry User’s Guide Fitzgerald & Long REBUILD.INVERTS Rebuild Cross Reference FilesUpdate Protected Commands Page RETURN.STRING Output Sentry Internal SubroutinesSample Call @SENTRY.ENCRYPTDATA.STRING, RETURN.STRING DATA.STRING InputTHE.KEY Fudge Tastes Good ENCRYPTION.KEY InputTHE.KEY = Fudge Tastes Good Subroutine SENTRY.USER.ITEM.CONTROLITEM.FOUND Output ACCESS.RIGHTS OutputERROR.TEXT Output USER.ITEM InputAppendix 1 Comment Input Subroutine SENTRY.VIOLATION.STAMPAppendix 1 Page Sentry KEY Bindings Appendix 2 Sentry User’s Guide Appendix 2