[an error occurred while processing this directive]

HP OpenVMS Systems

SEVMS
» 

HP OpenVMS Systems

OpenVMS information

» What's new on our site
» Upcoming events
» Configuration and buying assistance
» Send us your comments

HP OpenVMS systems

» OpenVMS software
» Supported Servers
» OpenVMS virtualization
» OpenVMS solutions and partners
» OpenVMS success stories
» OpenVMS service and support
» OpenVMS resources and information
» OpenVMS documentation
» Education and training

OpenVMS software

» Operating system
» OpenVMS clusters
» OpenVMS Galaxy
» e-Business products
» Opensource tools
» Networking
» System management
» Storage management
» Security products
» Application development and integration
» Software licensing
» SPD listings
» Whitepapers
» Ask the wizard
» Training
» OpenVMS books

Evolving business value

» Business Systems Evolution
» AlphaServer systems transition planning
» Alpha RetainTrust program

Related links

» HP Integrity servers
» HP Alpha systems
» HP storage
» HP software
» HP products and services
» HP solutions
» HP support
disaster proof
HP Integrity server animation
HP Integrity server animation
Content starts here
SEVMS access controls

For use with all external Digital World-Wide Web Servers

Discretionary & Mandatory Access Controls

Discretionary Access Controls

Discretionary access controls restrict access to objects (files, devices, directories, etc.) based upon the identity of the user. The control is "discretionary" in that a user with certain access rights (such as ownership of the object) can grant or rescind the access rights of another user to that object.

Mandatory Access Controls

Unlike discretionary access controls, mandatory access controls impose access restrictions in the form of security attributes which cannot be changed or bypassed by non-privileged users.

MAC security attributes are set by the security administrator and are enforced by the operating system -- they cannot be changed at the discretion of non-privileged users. Thus the term "mandatory" access controls.

The most common MAC models implement a set of hierarchical security levels and non-hierarchical security compartments. Each item of information is classified by level (i.e. Unclassified, Confidential, Secret, Top Secret, etc.) and one or more compartments (i.e. Project A, Project B, Project C, etc.). Each individual is assigned a clearance from the same set of classifications. The operating system then controls access to objects based upon these classifications.

Mandatory access control rules are straightforward and simple. Stated informally, a non-privileged user is only allowed to:

  • Read from a Lower Classification (A Secret subject can read an Unclassified object, but not a Top Secret object.)
  • Write to a Higher Classification (A Secret subject can write to a Top Secret object, but not to an Unclassified object.)
  • Read/Write to an Equal Classification (A Secret subject can read/write only to a Secret object.)