[an error occurred while processing this directive]

HP OpenVMS Systems Documentation

Content starts here

OpenVMS User's Manual


Previous Contents Index

Chapter 10
10 Controlling Access to Resources
     10.1     Displaying the Rights Identifiers of Your Process
     10.2     Security Profile of Objects
         10.2.1         Modifying a Security Profile
     10.3     Interpreting Protection Codes
     10.4     Default File Protection
         10.4.1         Default UIC Protection
         10.4.2         Default ACL Protection
         10.4.3         Renaming Files
         10.4.4         Explicit File Protection
     10.5     Accessing Files Across Networks
         10.5.1         Access Control Strings
         10.5.2         Protecting Access Control Strings
         10.5.3         Using Proxy Login Accounts to Protect Passwords
         10.5.4         General Access Proxy Accounts
     10.6     Auditing Access to Your Account and Files
         10.6.1         Observing Your Last Login Time
         10.6.2         Events That Can Trigger Security Alarms
         10.6.3         Security Audit Log Files
         10.6.4         Adding ACEs to Sensitive Files
Chapter 11
11 Defining Logical Names for Devices and Files
     11.1     Logical Name Characteristics
     11.2     Using System-Defined Logical Names
     11.3     Creating Logical Names
         11.3.1         Using the DEFINE Command
         11.3.2         Creating Logical Names in Command Procedures for File I/O
         11.3.3         Rules for Creating Logical Names
         11.3.4         Translation Attributes
         11.3.5         Access Modes
         11.3.6         Creating Logical Node Names
             11.3.6.1             Using Logical Node Names in File Specifications
             11.3.6.2             Overriding Access Control Strings
         11.3.7         Creating Multiple Logical Names for the Same Object
     11.4     Deleting Logical Names
     11.5     Logical Name Translation
         11.5.1         Iterative Translation
         11.5.2         Missing Fields Filled in with System Defaults
         11.5.3         Default Search Order for Logical Name Translations
     11.6     Displaying Logical Names
         11.6.1         Specifying a Logical Name Table to Search
         11.6.2         Displaying Translation Attributes and Access Modes
     11.7     Creating and Using Search Lists
         11.7.1         Using Search Lists with Commands That Accept Wildcards
         11.7.2         Using a Search List with the SET DEFAULT Command
         11.7.3         Using a Search List with the RUN Command
         11.7.4         Search Order for Multiple Search Lists
     11.8     Logical Name Table Characteristics
         11.8.1         Logical Name Table Directories
         11.8.2         Displaying the Structure of Directory Tables
     11.9     Default Logical Name Tables
         11.9.1         Process Logical Name Directory
         11.9.2         Process Logical Name Table
         11.9.3         System Logical Name Directory
         11.9.4         Shareable Logical Name Tables
         11.9.5         Default Protection of Shareable Logical Name Tables
         11.9.6         Privilege and Access Requirements for Managing Shareable Logical Names
     11.10     Creating Logical Name Tables
         11.10.1         Creating Process-Private Logical Name Tables
         11.10.2         Creating Shareable Logical Name Tables
         11.10.3         Creating Clusterwide Logical Name Tables
         11.10.4         Privilege and Access Requirements
         11.10.5         Modifying the Default Protection
         11.10.6         Establishing Quotas for Logical Name Tables
             11.10.6.1             Setting Job Table Quotas
     11.11     Modifying the Order of Logical Name Translations
     11.12     Deleting Logical Name Tables
     11.13     Process-Permanent Logical Names
         11.13.1         Equivalence Name Differences Between Interactive and Batch Processing
         11.13.2         Redirecting File I/O Using Process-Permanent Logical Names
             11.13.2.1             Redefining SYS$INPUT
             11.13.2.2             Redefining SYS$OUTPUT
             11.13.2.3             Redefining SYS$ERROR
             11.13.2.4             Redefining SYS$COMMAND
Chapter 12
12 Defining Symbols, Commands, and Expressions
     12.1     About Symbols
         12.1.1         Comparing Logical Names and Symbols
     12.2     Using Symbols
         12.2.1         Using Symbols to Represent DCL Commands
         12.2.2         Symbol Abbreviation
         12.2.3         Defining Foreign Commands
         12.2.4         Symbol Substitution
         12.2.5         Deleting Symbols
     12.3     Displaying Symbols
     12.4     Using Symbols with Other Symbols
         12.4.1         Symbol Concatenation
         12.4.2         Including Symbols in String Assignments
     12.5     Using Symbols to Store and Manipulate Data
     12.6     Character Strings
         12.6.1         Defining Character Strings
         12.6.2         Character String Expressions
         12.6.3         Character String Operations
         12.6.4         Comparing Character Strings
         12.6.5         Replacing Substrings
     12.7     Using Numeric Values and Expressions
         12.7.1         Specifying Numbers
         12.7.2         Internal Storage of Numbers
         12.7.3         Performing Arithmetic Operations
         12.7.4         Comparing Numbers
         12.7.5         Performing Numeric Overlays
     12.8     Using Logical Values and Expressions
         12.8.1         Logical Operations
         12.8.2         Logical Expressions
         12.8.3         Logical Operation Results
         12.8.4         Using Values Returned by Lexical Functions
         12.8.5         Order of Operations
         12.8.6         Evaluating Data Types
     12.9     Converting Value Types in Expressions
         12.9.1         Converting Strings to Integers
         12.9.2         Converting Integers to Strings
     12.10     Understanding Symbol Tables
         12.10.1         Local Symbol Tables
         12.10.2         Global Symbol Tables
         12.10.3         Symbol Table Search Order
     12.11     Masking the Value of Symbols
         12.11.1         SET SYMBOL Command
         12.11.2         Symbol Scoping State
     12.12     Understanding Symbol Substitution
         12.12.1         Forced Symbol Substitution
         12.12.2         Symbol Substitution Operators
     12.13     The Three Phases of Command Processing
         12.13.1         Phase 1: Command Input Scanning
         12.13.2         Phase 2: Command Parsing
         12.13.3         Phase 3: Expression Evaluation
         12.13.4         Repetitive and Iterative Substitution
         12.13.5         Undefined Symbols
     12.14     An Alternative to Using Symbols: Automatic Foreign Commands
         12.14.1         Using Automatic Foreign Commands
         12.14.2         Automatic Foreign Command Restrictions


Previous Next Contents Index