This chapter extends the discussion of security design introducedin OpenVMS Security Model. It describeshow the operating system controls the way a user process or an applicationcan access a protected object.
To summarize, the operating system controls access to anyobject that contains shareable information. These objects are knownas protected objects. Devices, volumes, logicalname tables, files, common event flag clusters,group and system global sections, resource domains, queues, capabilities,and security classes fall into this category. An accessing processcarries credentials in the form of rights identifiers,and all protected objects list a set of access requirements specifyingwho has a right to access the object in a given manner.
This chapter:
Describes the types of identificationthe system assigns to processes to define their access rights toobjects (Contents of a User's Security Profile)