|
Defining Times andConditions for System Access
Using the Authorize utility, you control when and how userscan access the system. Authorize Qualifiers Controlling Login Times and Conditions identifies the applicable qualifiers.
Restricting Work Times
AUTHORIZE qualifiers let you restrict system use to certaindays of the week and certain periods of the day. Restricting worktimes is useful to better balance the workload on your system. Restrictingaccess to accounts is also an effective way of preventing unauthorizeduse of the system outside of normal working hours.
Define primary and secondary days of the week with the /PRIMEDAYSqualifier, or conform to the default where primary days are Mondaythrough Friday and secondary days are Saturday and Sunday. For example, tomodify the defaults for a user who works Tuesday through Saturday,you would specify the /PRIMEDAYS qualifier as follows:
/PRIMEDAYS=(NOMONDAY,TUESDAY,WEDNESDAY,THURSDAY,FRIDAY,SATURDAY,NOSUNDAY)Occasionally an operational change occurs that conflicts withthe normal day assignments at your site, such as a holiday fallingon a primary day. To override the normal day assignment, use theDCL command SET DAY, and specify the day-type interpretation youwant for the current day. This requires OPER privilege. Note thatthis change applies to all logged-in users, as well as those whowill log in during the day. If users who are currently logged inare unauthorized for the day-type once it changes, they are loggedout of the system at the next hour. (The job controller enforcestime restrictions on an hourly basis.)
Decide which types of login access should be restricted tocertain hours. The login access qualifiers are: /LOCAL, /REMOTE,/DIALUP, /INTERACTIVE, /BATCH, and /NETWORK. However, if your siteapplies one set of primary and secondary hours for all types oflogins, you can specify the /ACCESS qualifier, which applies toall modes of access.
The following example shows how to apply the /BATCH qualifierto a user's account to disable the user from running batch jobsduring normal working hours:
/NOBATCH=(PRIMARY, 9-17)This specification permits the user to run batch jobs onlyduring the hours of 6:00 p.m. through 8:59 a.m. on primary daysbut all day on secondary days.
Restricting Modes of Operation
The following concerns might cause you to prohibit networkaccess for some of your users:
Use the AUTHORIZE qualifier /NONETWORK to prevent specificusers from having network access, as shown in the following example:
Anyof the AUTHORIZE access mode qualifiers (/LOCAL, /REMOTE, /DIALUP,/INTERACTIVE, /BATCH, or /NETWORK) can be negated in this mannerto restrict access to the system.UAF>
ADD JSMITH /NONETWORK, ...
Restricting Account Duration
It is good practice to set an account expiration time thatmatches the maximum length of time you expect the user to requireaccess. When the expiration time arrives, the system automaticallyprohibits access to the account. You must still remove the UAF recordand delete the user's files.
Use of the /EXPIRATION qualifier also forces you to periodicallyreview accounts and reauthorize only those that are necessary.
To set the account expiration time, use the AUTHORIZE qualifier/EXPIRATION in the user's UAF record. For example, the followingqualifier specifies that the user's account will expire on the 30thof December 2001:
/EXPIRATION=30-DEC-2001
Disabling Accounts
Youmay want to severely restrict the use of certain accounts. For example,you may want to disable specific accounts used only periodically,such as the SYSTEST and FIELD accounts, to limit possible misuseof these accounts. Disable the accounts with the /FLAGS=DISUSERqualifier. Temporarily enable the accounts with the /FLAGS=NODISUSERqualifier when needed.
Restricting Disk Volumes
Identify the user's default device and directory in the UAFrecord with the AUTHORIZE qualifiers /DEVICE and /DIRECTORY. Youcan limit the number of blocks available to the user on that disk(and any other disk) through the disk quota feature of the SystemManagement utility (SYSMAN), as described in the HP OpenVMSSystem Management Utilities Reference Manual: A-L.
The volume protection in place on other disks controls howmuch access a user can obtain to the disks. The user's privileges,which can be extended or limited through the AUTHORIZE qualifier/PRIVILEGES, also influence the access available (see Giving Users Privileges).
MarkingAccounts for External Authentication
Mark a user's account in the UAF record with the AUTHORIZEqualifier /FLAGS=EXTAUTH to allow the user to be externally authenticated.
See Enabling External Authentication formore information.
|