skip book previous and next navigation links
go up to top of book: HP OpenVMS Guide to System SecurityHP OpenVMS Guide to System Security
go to beginning of part: Security for the System AdministratorSecurity for the System Administrator
go to previous page: Controlling the Login ProcessControlling the Login Process
go to next page: Designing User GroupsDesigning User Groups
end of book navigation links

8Controlling Access to System Data and Resources  



This chapter describes how you design user groups and provideusers with the identification (UICs, identifiers, privileges) theyneed to do their work. As part of the discussion, the chapter showshow to assign proper protection codes and ACLs to objects so thatthe user can work efficiently while, at the same time, system dataand resources are properly protected. The chapter assumes you arefamiliar with the material in Protecting DataChapter 4 and Descriptions of Object ClassesChapter 5.

skip links to sections within this chapter.
Designing User Groups
Naming Individual Users in ACLs
Defining Sharing of Rights
Conditionalizing Identifiers for Different Users
Designing ACLs
Populating the Rights Database
Giving Users Privileges
Setting Default Protection and Ownership
Added Protection for System Data and Resources
end of content navigation links


go to previous page: Controlling the Login ProcessControlling the Login Process
go to next page: Designing User GroupsDesigning User Groups