[an error occurred while processing this directive]
HP OpenVMS Systems Documentation
OpenVMS Programming Concepts Manual
Previous
Contents
Index
Chapter 31
31
Creating User-Written System Services
31.1
Overview
31.2
Writing a Privileged Routine (User-Written System Service)
31.3
Creating a Privileged Shareable Image (VAX Only)
31.3.1
Creating User-Written Dispatch Routines on VAX Systems
31.3.2
Creating a PLV on VAX Systems
31.3.3
Declaring Privileged Routines as Universal Symbols Using Transfer Vectors on VAX Systems
31.4
Creating a User-Written System Service (Alpha Only)
31.4.1
Creating a PLV on Alpha Systems
31.4.2
Declaring Privileged Routines as Universal Symbols Using Symbol Vectors on Alpha Systems
Chapter 32
32
System Security Services
32.1
Overview of the Operating System's Protection Scheme
32.2
Identifiers
32.2.1
Identifier Format
32.2.2
General Identifiers
32.2.3
System-Defined Identifiers
32.2.4
UIC Identifiers
32.2.5
Facility Identifiers
32.2.6
Identifier Attributes
32.3
Rights Database
32.3.1
Initializing a Rights Database
32.3.2
Using System Services to Affect a Rights Database
32.3.2.1
Translating Identifier Values and Identifier Names
32.3.2.2
Adding Identifiers and Holders to the Rights Database
32.3.2.3
Determining Holders of Identifiers
32.3.2.4
Determining Identifiers Held by a Holder
32.3.2.5
Modifying the Identifier Record
32.3.2.6
Modifying a Holder Record
32.3.2.7
Removing Identifiers and Holders from the Rights Database
32.3.3
Search Operations
32.3.4
Modifying a Rights List
32.4
Persona (Alpha Only
1
)
32.4.1
Impersonation Services (Alpha Only)
32.4.1.1
Using Impersonation System Services
32.4.2
Per-Thread Security (Alpha Only)
32.4.2.1
Previous Security Model
32.4.2.2
Per-Thread Security Model
32.4.3
Persona Extensions (Alpha Only)
32.5
Managing Object Protection
32.5.1
Protected Objects
32.5.2
Object Security Profile
32.5.2.1
Displaying the Security Profile
32.5.2.2
Modifying the Security Profile
32.5.3
Types of Access Control Entries
32.5.3.1
Design Considerations
32.5.3.2
Translating ACEs
32.5.3.3
Creating and Maintaining ACEs
32.6
Protected Subsystems
32.7
Security Auditing
32.8
Checking Access Protection
32.8.1
Creating a Security Profile
32.8.2
SYS$CHKPRO System Sevice
32.8.3
SYS$CHECK_ACCESS System Service
32.9
SYS$CHECK_PRIVILEGE
32.10
Implementing Site-Specific Security Policies
32.10.1
Creating Loadable Security Services
32.10.1.1
Preparing and Loading a System Service
32.10.1.2
Removing an Executive Loaded Image
32.10.2
Installing Filters for Site-Specific Password Policies
32.10.2.1
Creating a Shareable Image
32.10.2.2
Installing a Shareable Image
Chapter 33
33
Authentication and Credential Management (ACM) System Service
33.1
Identification, Authentication, and Authorization
33.2
ACME Subsystem Components
33.3
SYS$ACM[W] Call Mechanics
33.3.1
SYS$ACM[W] Function Codes
33.3.2
SYS$ACM[W] Function Modifiers
33.3.3
Status Returned by the SYS$ACM[W] System Service
33.3.3.1
When the Return Status Indicates Failure
33.3.3.2
When the Return Status Indicates Success
33.3.3.2.1
When the Primary Status Indicates an Item Code Failure
33.3.3.2.2
When the Primary Status is ACME$_OPINCOMPL
33.3.4
Item Codes
33.3.4.1
Common vs. ACME-Specific Item Codes
33.3.4.2
Distinguishing Between Input and Output Item Codes
33.3.4.3
Text vs. Nontext Items
33.3.4.4
Single-Valued vs. Multivalued Item Semantics
33.3.5
Item Lists
33.3.5.1
Item List Chains
33.3.6
The ACM Communications Buffer and Itemset
33.3.7
Itemset Entries
33.3.8
Synchronization of Your System Service Calls
33.4
Authentication Techniques
33.4.1
Nondialogue Mode Operation
33.4.2
Dialogue Mode Operation
33.4.3
Login Categories and Classes
33.4.4
Principal Names
33.4.5
Targeting Your System Service Calls
33.4.5.1
DOI Names
33.4.5.2
When to Use DOI_NAME vs. DOI_ID
33.4.5.3
Looking Up DOI and ACME IDs
33.4.6
Determining ACME Information with the Query Function
33.4.7
Reporting an Event
33.5
Authentication Scenarios
33.5.1
Simple User Authentication
33.5.2
Evaluating Status Codes
33.5.3
Password Change Dialogue
33.5.4
Reauthentication of Current User
33.5.5
Manipulating Personas
33.5.6
Using CREPRC on Behalf of a User
33.6
Authentication Examples
33.6.1
Example Using Nondialogue Mode (C)
33.6.2
Example Using Dialogue Mode (Pascal)
Previous
Next
Contents
Index