skip book previous and next navigation links
go up to top of book: HP OpenVMS Guide to System SecurityHP OpenVMS Guide to System Security
go to beginning of part: Security for the System AdministratorSecurity for the System Administrator
go to beginning of chapter: Using Protected SubsystemsUsing Protected Subsystems
go to previous page: Applications for Protected SubsystemsApplications for Protected Subsystems
go to next page: Design ConsiderationsDesign Considerations
end of book navigation links

How Protected SubsystemsWork  



A protected subsystem is an application that, when run, causesthe process running the application to be granted one or more identifiers.For as long as a user runs the subsystem, the user's process rightslist carries these additional identifiers. How Protected Subsystems Differ from Normal Access Control shows how a protected subsystem adds a second levelof access control to traditional controls. 

Figure 1  How Protected Subsystems Differ from NormalAccess Control  
tbs

Users with execute access to the application gain access tothe subsystem. Once in the subsystem, users can work with the datafiles and other resources of the subsystem.

A subsystem can have several identifiers because the resourcesconsumed by the subsystem (the files, printers, and so forth) canbe protected differently.

Possession of subsystem identifiers is limited to the periodusers are executing the application. Once the users exit from theapplication, the identifiers are removed from their process rightslists. Subsystem identifiers are also removed from the rights listwhenever users enter a Ctrl/Y sequence or attempt to create a subprocess withthe DCL command SPAWN. (In this respect, use of the subsystem identifiersis identical to the operation of images installed with privileges.)

The following identifiersare reserved for use in the security subsystem and should not begranted to any user:


go to previous page: Applications for Protected SubsystemsApplications for Protected Subsystems
go to next page: Design ConsiderationsDesign Considerations