skip book previous and next navigation links
go up to top of book: HP OpenVMS Guide to System SecurityHP OpenVMS Guide to System Security
go to beginning of part: Security for the UserSecurity for the User
go to previous page: Checklist for Contributing to System SecurityChecklist for Contributing to System Security
go to next page: Contents of a User's Security ProfileContents of a User's Security Profile
end of book navigation links

4Protecting Data  



This chapter extends the discussion of security design introducedin OpenVMS Security Model. It describeshow the operating system controls the way a user process or an applicationcan access a protected object.

To summarize, the operating system controls access to anyobject that contains shareable information. These objects are knownas protected objects. Devices, volumes, logicalname tables, files, common event flag clusters,group and system global sections, resource domains, queues, capabilities,and security classes fall into this category. An accessing processcarries credentials in the form of rights identifiers,and all protected objects list a set of access requirements specifyingwho has a right to access the object in a given manner.

This chapter:



Descriptions of Object Classes describesthe unique features of each class of protected object.

skip links to sections within this chapter.
Contents of a User's Security Profile
Security Profile of Objects
How the System Determines If a User Can Access a Protected Object
Controlling Access with ACLs
Controlling Access with Protection Codes
Understanding Privileges and Control Access
Auditing Protected Objects
end of content navigation links


go to previous page: Checklist for Contributing to System SecurityChecklist for Contributing to System Security
go to next page: Contents of a User's Security ProfileContents of a User's Security Profile