1650 lines
43 KiB
Plaintext
1650 lines
43 KiB
Plaintext
|
______________________________________________________________________________
|
|||
|
|
|||
|
Using the VAX/VMS Authorize Utility
|
|||
|
Written by Line Shadow on 09/10/88
|
|||
|
|
|||
|
A Telecom Computer Security Bulletin File
|
|||
|
Volume One, Number 1, File 9 of 12
|
|||
|
______________________________________________________________________________
|
|||
|
|
|||
|
|
|||
|
Time to play God with your favorite
|
|||
|
___ ___ ___ ___ ___ ___ ___
|
|||
|
| | | | | | | |
|
|||
|
| d | i | g | i | t | a | l |
|
|||
|
|___|___|___|___|___|___|___|
|
|||
|
|
|||
|
VAX/VMS System
|
|||
|
|
|||
|
|
|||
|
In order to put this article to good use, you will have to acquire a high
|
|||
|
priviledged VAX account. I'm leaving that up to you, as this article is
|
|||
|
intended for the more advanced VAX hacker. You can expect another article
|
|||
|
discussing the tricks of the trade as regards getting an account with
|
|||
|
priviledges of that sort in future articles. Until then, you're on your own.
|
|||
|
|
|||
|
This is a reference on how to use a powerful utility within VMS that will
|
|||
|
allow you to create accounts on a digital VAX system. This utility, called the
|
|||
|
Authorize Utility is located on every VAX system. It can be found in the
|
|||
|
SYS$SYSTEM directory (which is a logical name for SYS$SYSROOT:[SYSEXE]) under
|
|||
|
the filename AUTHORIZE.EXE. This is the actual program and you just RUN it.
|
|||
|
Along with tons of other files within SYS$SYSTEM, you will find two other files
|
|||
|
that are manipulated by the Authorize Utility.
|
|||
|
|
|||
|
|
|||
|
Quick definitions for the Command Syntax:
|
|||
|
===============================================================================
|
|||
|
|
|||
|
Qualifier - A qualifier is an optional extension of a main command
|
|||
|
(discussed below) whose format consists of:
|
|||
|
command/qualifier
|
|||
|
|
|||
|
Use of brackets - Use of brackets ('[' and ']') placed around a logical-
|
|||
|
name indicates that the enclosed item is optional.
|
|||
|
Except in the case of specifying directories which
|
|||
|
has to have the brackets around the directory name.
|
|||
|
Also note that parenthesis arounf a logical name are
|
|||
|
required when noted as such.
|
|||
|
|
|||
|
file-spec,... - Indicates that additional parameters, values, or
|
|||
|
information can be entered.
|
|||
|
|
|||
|
-------------------------------------------------------------------------------
|
|||
|
Command Syntax: UAF> command [parameter]
|
|||
|
===============================================================================
|
|||
|
|
|||
|
ADD
|
|||
|
/[NO]ACCESS[=(range[,...])]
|
|||
|
/ACCOUNT=account-name
|
|||
|
/[NO]ADD_IDENTIFIER
|
|||
|
/ATTRIBUTES=(keyword[,...])
|
|||
|
/[NO]BATCH[=(range[,...])]
|
|||
|
/BIOLM=value
|
|||
|
/BYTLM=value
|
|||
|
/CLI=cli-name
|
|||
|
/CLITABLES=clitable-name
|
|||
|
/CPUTIME=time
|
|||
|
/DEFPRIVILEGES=([NO]privname[,...])
|
|||
|
/DEVICE=name
|
|||
|
/[NO]DIALUP[=(range[,...])]
|
|||
|
/DIOLM=value
|
|||
|
/DIRECTORY=directory-name
|
|||
|
/ENQLM=value
|
|||
|
/EXPIRATION=time
|
|||
|
/FILLM=value
|
|||
|
/GENERATE_PASSWORD[=keyword]
|
|||
|
/FLAGS=([NO]option[,...])
|
|||
|
/[NO]INTERACTIVE[=(range[,...])]
|
|||
|
/JTQUOTA=value
|
|||
|
/LGICMD=file-spec
|
|||
|
/[NO]LOCAL[=(range[,...])]
|
|||
|
/MAXACCTJOBS=value
|
|||
|
/MAXDETACH=value
|
|||
|
/MAXJOBS=value
|
|||
|
/[NO]NETWORK[=(range[,...])]
|
|||
|
/OWNER=owner-name
|
|||
|
/[NO]PASSWORD=(password[,password2])
|
|||
|
/PFLAGS=([NO]option[,...])
|
|||
|
/PGFLQUOTA=value
|
|||
|
/PRCLM=value
|
|||
|
/P_RESTRICT=(range[,...])
|
|||
|
/PRIMEDAYS=([NO]day[,...])
|
|||
|
/PRIORITY=value
|
|||
|
/PRIVILEGES=([NO]privname[,...])
|
|||
|
/[NO]PWDEXPIRED
|
|||
|
/[NO]PWDLIFETIME=time
|
|||
|
/PWDMINIMUM=value
|
|||
|
/QUEPRIORITY=value
|
|||
|
/[NO]REMOTE[=(range[,...])]
|
|||
|
/SFLAGS=([NO]option[,...])
|
|||
|
/SHRFILLM=value
|
|||
|
/S_RESTRICT=(range[,...])
|
|||
|
/TQELM=value
|
|||
|
/UIC=uic
|
|||
|
/WSDEFAULT=value
|
|||
|
/WSEXTENT=value
|
|||
|
/WSQUOTA=value
|
|||
|
ADD/IDENTIFIER
|
|||
|
/ATTRIBUTES=(keyword[,...])
|
|||
|
/USER=user-spec
|
|||
|
/VALUE=value-specifier
|
|||
|
ADD/PROXY
|
|||
|
COPY
|
|||
|
(Same qualifiers as ADD)
|
|||
|
CREATE/PROXY
|
|||
|
CREATE/RIGHTS
|
|||
|
DEFAULT
|
|||
|
(Same qualifiers as ADD)
|
|||
|
EXIT
|
|||
|
GRANT/IDENTIFIER
|
|||
|
/ATTRIBUTES=(keyword[,...])
|
|||
|
HELP
|
|||
|
(All commands and qualifiers)
|
|||
|
LIST
|
|||
|
/BRIEF
|
|||
|
/FULL
|
|||
|
LIST/IDENTIFIER
|
|||
|
/BRIEF
|
|||
|
/FULL
|
|||
|
/USER=user-spec
|
|||
|
/VALUE=value-specifier
|
|||
|
LIST/PROXY
|
|||
|
LIST/RIGHTS
|
|||
|
/USER=user-spec
|
|||
|
MODIFY
|
|||
|
/[NO]ACCESS[=(range[,...])]
|
|||
|
/ACCOUNT=account-name
|
|||
|
/ASTLM=value
|
|||
|
/[NO]BATCH[=(range[,...])]
|
|||
|
/BIOLM=value
|
|||
|
/BYTLM=value
|
|||
|
/CLI=cli-name
|
|||
|
/CLITABLES=clitable-name
|
|||
|
/CPUTIME=time
|
|||
|
/DEFPRIVILEGES=([NO]privname[,...])
|
|||
|
/DEVICE=name
|
|||
|
/[NO]DIALUP[=(range[,...])]
|
|||
|
/DIOLM=value
|
|||
|
/DIRECTORY=directory-name
|
|||
|
/ENQLM=value
|
|||
|
/EXPIRATION=time
|
|||
|
/FILLM=value
|
|||
|
/FLAGS=([NO]option[,...])
|
|||
|
/[NO]INTERACTIVE[=(range[,...])]
|
|||
|
/JTQUOTA=value
|
|||
|
/LGICMD=file-spec
|
|||
|
/[NO]LOCAL[=(range[,...])]
|
|||
|
/MAXACCTJOBS=value
|
|||
|
/MAXDETACH=value
|
|||
|
/MAXJOBS=value
|
|||
|
/[NO]MODIFY_IDENTIFIER
|
|||
|
/[NO]NETWORK[=(range[,...])]
|
|||
|
/OWNER=owner-name
|
|||
|
/PASSWORD=(password[,password2])
|
|||
|
/PFLAGS=([NO]option[,...])
|
|||
|
/PGFLQUOTA=value
|
|||
|
/PRCLM=value
|
|||
|
/P_RESTRICT=(range[,...])
|
|||
|
/PRIMEDAYS=([NO]day[,...])
|
|||
|
/PRIORITY=value
|
|||
|
/PRIVILEGES=([NO]privname[,...]!
|
|||
|
/[NO]PWDEXPIRED
|
|||
|
/[NO]PWDLIFETIME=time
|
|||
|
/PWDMINIMUM=value
|
|||
|
/QUEPRIORITY=value
|
|||
|
/[NO]REMOTE[=(range[,...])]
|
|||
|
/SFLAGS=([NO]option[,...])
|
|||
|
/SHRFILLM=value
|
|||
|
/S_RESTRICT=(range[,...])
|
|||
|
/TQELM=value
|
|||
|
/UIC=uic
|
|||
|
/WSDEFAULT=value
|
|||
|
/WSEXTENT=value
|
|||
|
/WSQUOTA=value
|
|||
|
MODIFY/IDENTIFIER
|
|||
|
/ATTRIBUTES=(keyword[,...])
|
|||
|
/HOLDER=holder-name
|
|||
|
/NAME=id-name
|
|||
|
/VALUE=value-specifier
|
|||
|
MODIFY/SYSTEM_PASSWORD=system-password
|
|||
|
REMOVE
|
|||
|
/[NO]REMOVE_IDENTIFIER
|
|||
|
REMOVE/PROXY
|
|||
|
RENAME
|
|||
|
/PASSWORD[=(password[,password2])]
|
|||
|
/[NO]MODIFY_IDENTIFIER
|
|||
|
RENAME/IDENTIFIER
|
|||
|
REVOKE/IDENTIFIER
|
|||
|
SHOW
|
|||
|
/BRIEF
|
|||
|
SHOW/IDENTIFIER
|
|||
|
/BRIEF
|
|||
|
/FULL
|
|||
|
/USER=user-spec
|
|||
|
/VALUE=value-specifier
|
|||
|
SHOW/PROXY
|
|||
|
SHOW/RIGHTS
|
|||
|
/USER=user-spec
|
|||
|
-------------------------------------------------------------------------------
|
|||
|
Description:
|
|||
|
===============================================================================
|
|||
|
|
|||
|
Using Authorize, you control access to the system and its resources by
|
|||
|
|
|||
|
o Creating new records and modifying existing records in the system user
|
|||
|
authorization file (SYS$SYSTEM:SYSUAF.DAT) and the network user
|
|||
|
authorization file (SYS$SYSTEM:NETUAF.DAT)
|
|||
|
|
|||
|
o Creating new records and modifying existing records in the rights
|
|||
|
database file (SYS$SYSTEM:RIGHTSLIST.DAT)
|
|||
|
|
|||
|
-------------------------------------------------------------------------------
|
|||
|
Command Summary:
|
|||
|
===============================================================================
|
|||
|
|
|||
|
ADD
|
|||
|
--------------------
|
|||
|
The ADD command will create a new entry in the user authorization file.
|
|||
|
|
|||
|
Format for creating new entries in SYSUAF.DAT:
|
|||
|
|
|||
|
ADD newusername [/qualifiers]
|
|||
|
|
|||
|
Qualifiers:
|
|||
|
/ACCESS
|
|||
|
|
|||
|
/[NO]ACCESS=([PRIMARY], [n-m], [n] [,...] [SECONDARY], [n-m], [n] [,...])
|
|||
|
/[NO]ACCESS="[PRIMARY][:] [n-m][,] [n][,...][;] [SECONDARY][:] [n-m][,...]"
|
|||
|
|
|||
|
Used to specify hours of access for all modes of logins. Specify hours
|
|||
|
as integers from 0 to 23, inclusive. Hours may be specified as single
|
|||
|
hours (n), or as ranges of hours (n-m). If the ending hour of a range
|
|||
|
is earlier than the starting hour, the range extends from the starting
|
|||
|
hour through midnight to the the ending hour. The first set of hours
|
|||
|
after the keyword PRIMARY specifies hours on primary days; the second
|
|||
|
set of hours after the keyword SECONDARY specifies hours on secondary
|
|||
|
days.
|
|||
|
|
|||
|
All the list elements are optional. If no hours are specified for a
|
|||
|
day type, access is permitted the entire day. If only primary hours
|
|||
|
or only secondary hours are given, no access is permitted for secondary
|
|||
|
or primary days, respectively. If hours are given with no day type, they
|
|||
|
apply to both types of days.
|
|||
|
|
|||
|
Negating the qualifier by specifying /NOACCESS=(...) completely inverts
|
|||
|
the sense of the access hours.
|
|||
|
|
|||
|
Examples:
|
|||
|
|
|||
|
/ACCESS allows unrestricted access
|
|||
|
/NOACCESS=SECONDARY allows access on primary days only
|
|||
|
/ACCESS=(9-17) allows access from 9am through 5 pm on all days
|
|||
|
/NOACCESS=(PRIMARY, 9-17, SECONDARY, 18-8)
|
|||
|
allows access from 9 through 5 on secondary days
|
|||
|
and all but 9 through 5 on primary days
|
|||
|
/ACCESS="Primary: 9-16; Secondary: 18-7, 8; Primary: 17"
|
|||
|
allows access from 9 through 5 on primary days
|
|||
|
and all but 9 through 5 on secondary days
|
|||
|
|
|||
|
To specify access hours for specific types of logins, see the
|
|||
|
/BATCH, /NETWORK, /INTERACTIVE, /LOCAL, /DIALUP, and /REMOTE qualifiers.
|
|||
|
|
|||
|
|
|||
|
/ACCOUNT
|
|||
|
|
|||
|
/ACCOUNT=account-name
|
|||
|
|
|||
|
Specifies a default account name. This field is often used for billing
|
|||
|
purposes, and should consist of 1 through 8 characters.
|
|||
|
|
|||
|
|
|||
|
/ADD_IDENTIFIER
|
|||
|
|
|||
|
/[NO]ADD_IDENTIFIER
|
|||
|
|
|||
|
Controls whether an identifier corresponding to the specified username
|
|||
|
and UIC is added to the rights database. The default is /ADD_IDENTIFIER.
|
|||
|
|
|||
|
|
|||
|
/ASTLM
|
|||
|
|
|||
|
/ASTLM=n
|
|||
|
|
|||
|
Specifies the AST queue limit, which is the total number of asynchronous
|
|||
|
system trap operations and scheduled wakeup requests that can be
|
|||
|
outstanding at one time for the user.
|
|||
|
|
|||
|
|
|||
|
/BATCH
|
|||
|
|
|||
|
/[NO]BATCH=([PRIMARY], [n-m], [n] [,...] [SECONDARY], [n-m], [n] [,...])
|
|||
|
/[NO]BATCH="[PRIMARY][:] [n-m][,] [n][,...][;] [SECONDARY][:] [n-m][,...]"
|
|||
|
|
|||
|
Specifies hours of access permitted for batch jobs. For a detailed
|
|||
|
description of the interpretation of the access specification, see the
|
|||
|
/ACCESS qualifier.
|
|||
|
|
|||
|
|
|||
|
/BIOLM
|
|||
|
|
|||
|
/BIOLM=n
|
|||
|
|
|||
|
Specifies the total buffered I/O operations that can be outstanding
|
|||
|
at one time.
|
|||
|
|
|||
|
|
|||
|
/BYTLM
|
|||
|
|
|||
|
/BYTLM=n
|
|||
|
|
|||
|
Total number of bytes that can be specified for transfer in
|
|||
|
outstanding buffered I/O operations.
|
|||
|
|
|||
|
|
|||
|
/CLI
|
|||
|
|
|||
|
/CLI=cli-name
|
|||
|
|
|||
|
Name of the default command interpreter.
|
|||
|
|
|||
|
|
|||
|
/CLITABLES
|
|||
|
|
|||
|
/CLITABLES=table-name
|
|||
|
|
|||
|
Name of the default command interpreter tables.
|
|||
|
|
|||
|
|
|||
|
/CPUTIME
|
|||
|
|
|||
|
/CPUTIME=delta-time
|
|||
|
|
|||
|
Maximum amount of CPU time a user process can take per session. The
|
|||
|
unit of time must be in delta format. 0 means infinite.
|
|||
|
|
|||
|
|
|||
|
/DEFPRIVILEGES
|
|||
|
|
|||
|
/DEFPRIVILEGES=([NO]privname [,...])
|
|||
|
|
|||
|
Specifies the default privileges for the user (i.e., those enabled
|
|||
|
at login time). A NO prefix removes this privilege from the user;
|
|||
|
specifying a privilege without the NO prefix allows the user that
|
|||
|
privilege.
|
|||
|
|
|||
|
There are many privileges available with varying degrees of power and
|
|||
|
potential system impact. Please see the VAX/VMS System Manager's
|
|||
|
Reference Manual for a more detailed discussion of the available
|
|||
|
privileges.
|
|||
|
|
|||
|
|
|||
|
/DEVICE
|
|||
|
|
|||
|
/DEVICE=device-name
|
|||
|
|
|||
|
Name of default device (must be a direct access device) from one to
|
|||
|
fifteen characters. The colon is automatically added if omitted.
|
|||
|
A blank device is interpreted as SYS$SYSDISK.
|
|||
|
|
|||
|
|
|||
|
/DIALUP
|
|||
|
|
|||
|
/[NO]DIALUP=([PRIMARY], [n-m], [n] [,...] [SECONDARY], [n-m], [n] [,...])
|
|||
|
/[NO]DIALUP="[PRIMARY][:] [n-m][,] [n][,...][;] [SECONDARY][:] [n-m][,...]"
|
|||
|
|
|||
|
Specifies hours of access permitted for interactive login via dialup
|
|||
|
terminals. For a detailed description of the interpretation of the
|
|||
|
access specification, see the /ACCESS qualifier.
|
|||
|
|
|||
|
|
|||
|
/DIOLM
|
|||
|
|
|||
|
/DIOLM=n
|
|||
|
|
|||
|
Total direct (usually disk) I/O operations that can be outstanding at
|
|||
|
one time.
|
|||
|
|
|||
|
|
|||
|
/DIRECTORY
|
|||
|
|
|||
|
/DIRECTORY=directory-name
|
|||
|
|
|||
|
Name of default login directory. Brackets (either [] or <>) must be
|
|||
|
supplied.
|
|||
|
|
|||
|
|
|||
|
/ENQLM
|
|||
|
|
|||
|
/ENQLM=n
|
|||
|
|
|||
|
Total number of lock requests which may be outstanding at one time.
|
|||
|
|
|||
|
|
|||
|
/EXPIRATION
|
|||
|
|
|||
|
/EXPIRATION=time
|
|||
|
|
|||
|
Expiration date and time of the account. Specify as an absolute or
|
|||
|
combination time.
|
|||
|
|
|||
|
|
|||
|
/FILLM
|
|||
|
|
|||
|
/FILLM=n
|
|||
|
|
|||
|
Total number of files that can be open at one time, including active
|
|||
|
network logical links.
|
|||
|
|
|||
|
|
|||
|
/FLAGS
|
|||
|
|
|||
|
/FLAGS=([NO]option[,...])
|
|||
|
|
|||
|
Login flags for this user. Options which may be specified are:
|
|||
|
|
|||
|
[NO]AUDIT - [do not] audit all security relevant actions
|
|||
|
[NO]AUTOLOGIN - [do not] restrict this account to autologins only
|
|||
|
[NO]CAPTIVE - [do not] prevent user
|
|||
|
[NO]DEFCLI - [do not] prevent user from changing default CLI
|
|||
|
or CLI tables
|
|||
|
[NO]DISCTLY - [do not] disable <CTRL/Y> interrupts
|
|||
|
[NO]DISMAIL - [do not] prevent mail delivery to this user
|
|||
|
[NO]DISNEWMAIL - [do not] suppress "New Mail..." announcements
|
|||
|
[NO]DISRECONNECT-[do not] disable automated reconnections
|
|||
|
[NO]DISREPORT - [do not] disable time of last login and other
|
|||
|
security reports
|
|||
|
[NO]DISUSER - [do not] disable this account completely
|
|||
|
[NO]DISWELCOME - [do not] suppress "Welcome to..." login message
|
|||
|
[NO]GENPWD - [do not] require user to use generated passwords
|
|||
|
[NO]LOCKPWD - [do not] prevent user from changing password
|
|||
|
[NO]PWD_EXPIRED- [do not] mark password as expired
|
|||
|
[NO]PWD2_EXPIRED-[do not] mark second password as expired
|
|||
|
|
|||
|
|
|||
|
/GENERATE
|
|||
|
|
|||
|
/GENERATE
|
|||
|
/GENERATE=CURRENT
|
|||
|
/GENERATE=PRIMARY
|
|||
|
/GENERATE=SECONDARY
|
|||
|
/GENERATE=BOTH
|
|||
|
/GENERATE=ALL
|
|||
|
|
|||
|
Generate a random password. The formats of the passwords is the same
|
|||
|
as for the DCL SET PASSWORD /GENERATE command.
|
|||
|
|
|||
|
|
|||
|
/INTERACTIVE
|
|||
|
|
|||
|
/[NO]INTERACTIVE=([PRIMARY], [n-m], [n] [,...] [SECONDARY], [n-m], [n] [,...])
|
|||
|
/[NO]INTERACTIVE="[PRIMARY][:] [n-m][,] [n][,...][;] [SECONDARY][:] [n][,...]"
|
|||
|
|
|||
|
Specifies hours of access permitted for interactive login via any
|
|||
|
terminal. For a detailed description of the interpretation of the
|
|||
|
/ACCESS qualifier.
|
|||
|
|
|||
|
/JTQUOTA
|
|||
|
|
|||
|
/JTQUOTA=n
|
|||
|
|
|||
|
Specifies the initial byte quota with which the job-wide logical name
|
|||
|
table is to be created with.
|
|||
|
|
|||
|
|
|||
|
/LGICMD
|
|||
|
|
|||
|
/LGICMD=filespec
|
|||
|
|
|||
|
Name of login command file. Default device and directory are used to
|
|||
|
locate the command file.
|
|||
|
|
|||
|
|
|||
|
/LOCAL
|
|||
|
|
|||
|
/[NO]LOCAL=([PRIMARY], [n-m], [n] [,...] [SECONDARY], [n-m], [n] [,...])
|
|||
|
/[NO]LOCAL="[PRIMARY][:] [n-m][,] [n][,...][;] [SECONDARY][:] [n-m][,...]"
|
|||
|
|
|||
|
Specifies hours of access permitted for interactive login via local
|
|||
|
terminals. For a detailed description of the interpretation of the
|
|||
|
access specification, see the /ACCESS qualifier.
|
|||
|
|
|||
|
|
|||
|
/MAXACCTJOBS
|
|||
|
|
|||
|
/MAXACCTJOBS=n
|
|||
|
|
|||
|
Interactive and detached processes
|
|||
|
which may be active at one time for all users which are on the same
|
|||
|
account as the user for which the qualifier is present.
|
|||
|
|
|||
|
|
|||
|
/MAXDETACH
|
|||
|
|
|||
|
/MAXDETACH=n
|
|||
|
|
|||
|
Specifies the maximum number of detached processes with this username
|
|||
|
that may be active at one time. Processes which cause this count to
|
|||
|
be exceeded are terminated.
|
|||
|
|
|||
|
|
|||
|
/MAXJOBS
|
|||
|
|
|||
|
/MAXJOBS=n
|
|||
|
|
|||
|
Maximum number of interactive, batch, and detached processes with this
|
|||
|
username which can be active at one time. Processes which cause this
|
|||
|
count to be exceeded are terminated.
|
|||
|
|
|||
|
|
|||
|
/NETWORK
|
|||
|
|
|||
|
/[NO]NETWORK=([PRIMARY], [n-m], [n] [,...] [SECONDARY], [n-m], [n] [,...])
|
|||
|
/[NO]NETWORK="[PRIMARY][:] [n-m][,] [n][,...][;] [SECONDARY][:] [n-m][,...]"
|
|||
|
|
|||
|
Specifies hours of access permitted for network jobs. For a detailed
|
|||
|
description of the interpretation of the access specification, see the
|
|||
|
/ACCESS qualifier.
|
|||
|
|
|||
|
|
|||
|
/OWNER
|
|||
|
|
|||
|
/OWNER=owner-name
|
|||
|
|
|||
|
Name of owner for billing purposes, etc. May be from one to 31 characters.
|
|||
|
|
|||
|
|
|||
|
/PASSWORD
|
|||
|
|
|||
|
/PASSWORD=(password [,password2])
|
|||
|
/NOPASSWORD
|
|||
|
|
|||
|
Password(s) for login. Must be from 0 to 31 characters in length, and
|
|||
|
must be composed of alphanumeric characters, dollar signs, and underscores.
|
|||
|
|
|||
|
To set the first password with no second password, specify
|
|||
|
|
|||
|
/PASSWORD=password
|
|||
|
|
|||
|
To set both passwords, specify
|
|||
|
|
|||
|
/PASSWORD=(password, password2)
|
|||
|
|
|||
|
To set only the first password leaving the second alone, specify
|
|||
|
|
|||
|
/PASSWORD=(password, "")
|
|||
|
|
|||
|
To set only the second password leaving the first alone, specify
|
|||
|
|
|||
|
/PASSWORD=("", password2)
|
|||
|
|
|||
|
To clear the second password leaving the first alone, specify
|
|||
|
|
|||
|
/PASSWORD=""
|
|||
|
|
|||
|
To clear both passwords, specify
|
|||
|
|
|||
|
/NOPASSWORD
|
|||
|
|
|||
|
|
|||
|
/PBYTLM
|
|||
|
|
|||
|
/PBYTLM=n
|
|||
|
|
|||
|
Paged pool byte count limit.
|
|||
|
|
|||
|
|
|||
|
/PFLAGS
|
|||
|
|
|||
|
/PFLAGS=([NO]option[,...])
|
|||
|
|
|||
|
This qualifier is obsolete and is retained for compatibility purposes.
|
|||
|
For current usage, see the /ACCESS, etc., qualifiers.
|
|||
|
Login flags for primary days. Options are:
|
|||
|
|
|||
|
[NO]DISDIALUP - [do not] prohibit user from dialing in
|
|||
|
[NO]DISNETWORK - [do not] prohibit user from logging in via a
|
|||
|
"SET HOST" command.
|
|||
|
|
|||
|
|
|||
|
/PGFLQUOTA
|
|||
|
|
|||
|
/PGFLQUOTA=n
|
|||
|
|
|||
|
Total pages that this process can use in the system paging file. Should
|
|||
|
be a minimum of 2048 for a typical interactive process.
|
|||
|
|
|||
|
|
|||
|
/P_RESTRICT
|
|||
|
|
|||
|
/P_RESTRICT=(n-m[,...])
|
|||
|
|
|||
|
or
|
|||
|
|
|||
|
/P_RESTRICT=(n[,...])
|
|||
|
|
|||
|
This qualifier is obsolete and is retained for compatibility purposes.
|
|||
|
For current usage, see the /ACCESS, etc., qualifiers.
|
|||
|
Used to specify hours or ranges of hours to restrict user from logging in on
|
|||
|
primary days.
|
|||
|
|
|||
|
/P_RESTRICT=(...) is roughly equivale7t to /NOACCESS=(PRIMARY, ...)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
/PRCLM
|
|||
|
|
|||
|
/PRCLM=n
|
|||
|
|
|||
|
Total number of subprocesses that can exist at one time.
|
|||
|
|
|||
|
|
|||
|
/PRIMEDAYS
|
|||
|
|
|||
|
/PRIMEDAYS=([NO]day[,...])
|
|||
|
|
|||
|
Used to define primary and secondary days. A day prefixed with NO becomes
|
|||
|
a secondary day, and a day without the NO prefix is defined as a primary
|
|||
|
day. Primary and secondary day definitions are used in conjunction with
|
|||
|
the /ACCESS, etc., qualifiers.
|
|||
|
|
|||
|
|
|||
|
/PRIORITY
|
|||
|
|
|||
|
/PRIORITY=n
|
|||
|
|
|||
|
Default base priority for user. The priority should be in the range from
|
|||
|
0 - 31, and 4 is the default for a timesharing user.
|
|||
|
|
|||
|
|
|||
|
/PRIVILEGES
|
|||
|
|
|||
|
/PRIVILEGES=([NO]privname[,...])
|
|||
|
|
|||
|
Specifies authorized privileges for this user. Privileges which are
|
|||
|
allowed or disallowed for this user. A NO prefix removes this privalege
|
|||
|
from the user; specifying a privilege without the NO prefix allows the
|
|||
|
user that privilege.
|
|||
|
|
|||
|
There are many privileges available with varying degrees of power and
|
|||
|
potential system impact. I will make up a list of the priviledges in a
|
|||
|
future article, until then...set them to ALL! Heheh...
|
|||
|
|
|||
|
|
|||
|
/PWDEXPIRED
|
|||
|
|
|||
|
/[NO]PWDEXPIRED
|
|||
|
|
|||
|
Password is [not] pre-expired. When a password is pre-expired, the
|
|||
|
user is allowed to log in once, at which time he must change his
|
|||
|
password or be locked out of the system.
|
|||
|
|
|||
|
|
|||
|
/PWDLIFETIME
|
|||
|
|
|||
|
/PWDLIFETIME=delta-time
|
|||
|
/PWDLIFETIME=NONE
|
|||
|
|
|||
|
Password lifetime. If the date of last password change is older than
|
|||
|
the password lifetime, when the user logs in, he is issued a warning
|
|||
|
message and the password is marked as expired. If there is no password
|
|||
|
lifetime, the password never expires.
|
|||
|
|
|||
|
Delta-time is in the form: [dddd-] [hh:mm:ss.cc]
|
|||
|
|
|||
|
|
|||
|
/PWDMINIMUM
|
|||
|
|
|||
|
/PWDMINIMUM=n
|
|||
|
|
|||
|
Minimum password length in characters. Note that this value is only
|
|||
|
enforced by the SET PASSWORD command; passwords in violation of this
|
|||
|
value may be specified to AUTHORIZE.
|
|||
|
|
|||
|
|
|||
|
/QUEPRIORITY
|
|||
|
|
|||
|
/QUEPRIORITY=n
|
|||
|
|
|||
|
Maximum priority for queuing batch and print jobs. The priority should
|
|||
|
be in the range from 0 - 31, and 4 is the default value for a
|
|||
|
timesharing user.
|
|||
|
|
|||
|
|
|||
|
/REMOTE
|
|||
|
|
|||
|
/[NO]REMOTE=([PRIMARY], [n-m], [n] [,...] [SECONDARY], [n-m], [n] [,...])
|
|||
|
/[NO]REMOTE="[PRIMARY][:] [n-m][,] [n][,...][;] [SECONDARY][:] [n-m][,...]"
|
|||
|
|
|||
|
Specifies hours of access permitted for interactive login via network
|
|||
|
remote terminals (i.e., SET HOST). For a detailed description of the
|
|||
|
interpretation of the access specification, see the /ACCESS qualifier.
|
|||
|
|
|||
|
|
|||
|
/SFLAGS
|
|||
|
|
|||
|
/SFLAGS=([NO]option[,...])
|
|||
|
|
|||
|
This qualifier is obsolete and is retained for compatibility purposes.
|
|||
|
For current usage, see the /ACCESS, etc., qualifiers.
|
|||
|
Login flags for secondary days. Options are:
|
|||
|
|
|||
|
[NO]DISDIALUP - [do not] prohibit user from dialing in
|
|||
|
[NO]DISNETWORK - [do not] prohibit user from logging in via a
|
|||
|
"SET HOST" command.
|
|||
|
|
|||
|
|
|||
|
/S_RESTRICT
|
|||
|
|
|||
|
/S_RESTRICT=(n-m[,...])
|
|||
|
|
|||
|
or
|
|||
|
|
|||
|
/S_RESTRICT=(n[,...])
|
|||
|
|
|||
|
This qualifier is obsolete and is retained for compatibility purposes.
|
|||
|
For current usage, see the /ACCESS, etc., qualifiers.
|
|||
|
Used to specify hours or ranges of hours to restrict user from logging in on
|
|||
|
secondary days.
|
|||
|
|
|||
|
/S_RESTRICT=(...) is roughly equivalent to /NOACCESS=(SECONDARY, ...)
|
|||
|
|
|||
|
|
|||
|
/SHRFILLM
|
|||
|
|
|||
|
/SHRFILLM=n
|
|||
|
|
|||
|
Maximum number of shared files allowed to be open at one time.
|
|||
|
|
|||
|
|
|||
|
/TQELM
|
|||
|
|
|||
|
/TQELM=n
|
|||
|
|
|||
|
Total entries in the timer queue plus the number of temporary common
|
|||
|
event flag clusters that the user can have at one time.
|
|||
|
|
|||
|
|
|||
|
/UIC
|
|||
|
|
|||
|
/UIC=uic
|
|||
|
|
|||
|
User identification code as explained in the VAX/VMS System Manager's
|
|||
|
Reference Manual. The UIC should have an octal group number and user
|
|||
|
number, and be separated by a comma and enclosed in brackets.
|
|||
|
|
|||
|
|
|||
|
/WSDEFAULT
|
|||
|
|
|||
|
/WSDEFAULT=n
|
|||
|
|
|||
|
Initial limit of a working set for the user process.
|
|||
|
|
|||
|
|
|||
|
/WSEXTENT
|
|||
|
|
|||
|
/WSEXTENT=n
|
|||
|
|
|||
|
Maximum to which the user's process may raise its working set limit
|
|||
|
when there is free memory available.
|
|||
|
|
|||
|
|
|||
|
/WSQUOTA
|
|||
|
|
|||
|
/WSQUOTA=n
|
|||
|
|
|||
|
Maximum to which the user's process may raise the working set limit
|
|||
|
when system memory is in demand.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
ADD/IDENTIFIER
|
|||
|
--------------------
|
|||
|
The ADD/IDENTIFIER command is used to add an identifier to the rights
|
|||
|
database.
|
|||
|
|
|||
|
Format:
|
|||
|
|
|||
|
ADD/IDENTIFIER [id-name]
|
|||
|
|
|||
|
Parameters:
|
|||
|
id-name
|
|||
|
|
|||
|
specifies the name of the identifier to be added to the rights
|
|||
|
database. If you omit the name, you must specify the /USER
|
|||
|
qualifier. The id-name is a string of 1 through 32
|
|||
|
alphanumeric characters that may contain underscores and dollar
|
|||
|
signs. The name must contain at least one non-numeric
|
|||
|
character.
|
|||
|
|
|||
|
Qualifiers:
|
|||
|
/ATTRIBUTES
|
|||
|
|
|||
|
/ATTRIBUTES=(keyword)
|
|||
|
|
|||
|
Specifies attributes to be associated with the new identifier.
|
|||
|
Valid keywords are:
|
|||
|
|
|||
|
[NO]DYNAMIC Indicates whether or not unprivileged holders of the
|
|||
|
identifier may add or remove the identifier from the
|
|||
|
process rights list. The default is NODYNAMIC.
|
|||
|
|
|||
|
[NO]RESOURCE Indicates whether or not holders of the identifier
|
|||
|
may charge resources to it. The default is NORESOURCE.
|
|||
|
|
|||
|
|
|||
|
/USER
|
|||
|
|
|||
|
/USER=user-spec
|
|||
|
|
|||
|
Scans the UAF record(s) of the specified user(s) and creates
|
|||
|
the appropriate identifiers(s). Specify user-spec by username
|
|||
|
or UIC. You can user the asterisk wildcard to specify multiple
|
|||
|
usernames or UICs: full user of the asterisk and percent
|
|||
|
wildcards is permitted for user names; UICs must be in the form
|
|||
|
[*,*], [n,*], [*,n], or [n,n]. A wildcard username
|
|||
|
specification (i.e., *) creates identifiers alphabetically by
|
|||
|
username; a wildcard UIC specification (i.e., [*,*]) creates
|
|||
|
them in numerical order by UIC.
|
|||
|
|
|||
|
|
|||
|
/VALUE
|
|||
|
|
|||
|
/VALUE=value-specifier
|
|||
|
|
|||
|
Specifies the value to be attached to the identifier. Valid formats
|
|||
|
for the value-specifier are:
|
|||
|
|
|||
|
IDENTIFIER:integer An integer value in the range of
|
|||
|
32768 to 268435455, or a
|
|||
|
hexadecimal number in the range
|
|||
|
%X00008000 to 0FFFFFF
|
|||
|
|
|||
|
UIC:uic A uic value in the standard UIC
|
|||
|
format
|
|||
|
|
|||
|
Examples:
|
|||
|
|
|||
|
The following examples illustrate the use of the ADD/IDENTIFIER
|
|||
|
command.
|
|||
|
|
|||
|
1. UAF> ADD/IDENTIFIER/VALUE=UIC:[300,011] INVENTORY
|
|||
|
identifier INVENTORY value: [000300,000011] added to RIGHTSLIST.DAT
|
|||
|
|
|||
|
This command adds to the rights database an identifier named
|
|||
|
INVENTORY. By default, the identifier is not marked as a
|
|||
|
resource.
|
|||
|
|
|||
|
2. UAF> ADD/IDENTIFIER/ATTRIBUTES=(RESOURCE) -
|
|||
|
/VALUE=IDENTIFIER:%X80011 PAYROLL
|
|||
|
identifier PAYROLL value: %X80080011 added to RIGHTSLIST.DAT
|
|||
|
|
|||
|
This command adds the identifier PAYROLL and marks it as a
|
|||
|
resource.
|
|||
|
|
|||
|
|
|||
|
ADD/PROXY
|
|||
|
Adds a user record to the network UAF.
|
|||
|
|
|||
|
Format
|
|||
|
|
|||
|
ADD/PROXY node::remote-user local-user
|
|||
|
|
|||
|
Parameters:
|
|||
|
node
|
|||
|
|
|||
|
specifies a node name (1 through 6 alphanumberic characters).
|
|||
|
|
|||
|
remote-user
|
|||
|
|
|||
|
specifies the username of a user at a remote node. If you
|
|||
|
specify an asterisk, all users at the specified node can access
|
|||
|
files of a user specified on the local node.
|
|||
|
|
|||
|
local-user
|
|||
|
|
|||
|
specifies the username of a user on a local node.
|
|||
|
|
|||
|
Examples:
|
|||
|
|
|||
|
1. UAF> ADD/PROXY MISHA::MARCO *
|
|||
|
record successfully added NETUAF.DAT
|
|||
|
|
|||
|
The command in this example specifies that the user MARCO on
|
|||
|
the remote node MISHA can only access the files of MARCO on the
|
|||
|
local node.
|
|||
|
|
|||
|
2. UAF> ADD/PROXY MISHA::* MARCO
|
|||
|
record successfully added to NETUAF.DAT
|
|||
|
|
|||
|
The command in this example specifies that any user on the
|
|||
|
remote node MISHA can access the files of MARCO on the local
|
|||
|
node.
|
|||
|
|
|||
|
Parameters:
|
|||
|
newusername
|
|||
|
|
|||
|
"newusername" specifies the name of the user to be added to the user
|
|||
|
authorization file.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
COPY
|
|||
|
--------------------
|
|||
|
The COPY command is used to make a copy of a record in SYSUAF.DAT. The
|
|||
|
full range of qualifiers is available for the command in order to
|
|||
|
change certain fields in the process of the copy operation.
|
|||
|
|
|||
|
Format:
|
|||
|
|
|||
|
COPY existing-username new-username [/qualifiers]
|
|||
|
|
|||
|
Parameters:
|
|||
|
existing-username new-username
|
|||
|
|
|||
|
existing-username is the source authorization record;
|
|||
|
new-username is the destination authorization record.
|
|||
|
|
|||
|
Qualifiers:
|
|||
|
(Same qualifiers as ADD)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
CREATE
|
|||
|
--------------------
|
|||
|
This command will create a Proxy Login File (NETUAF.DAT) if one does
|
|||
|
not already exist or the rights database (RIGHTSLIST.DAT).
|
|||
|
|
|||
|
Qualifiers:
|
|||
|
/PROXY
|
|||
|
Creates and initializes a network UAF, NETUAF.DAT. The /PROXY
|
|||
|
qualifier is required. The file is created with no records and
|
|||
|
is assigned the following protection:
|
|||
|
|
|||
|
(S:RWED,O:RWED,G:RWE,W)
|
|||
|
|
|||
|
|
|||
|
/RIGHTS
|
|||
|
Creates and initializes the rights database, RIGHTSLIST.DAT,
|
|||
|
If it does not already exist. The file is created with no
|
|||
|
records and is assigned the following protection:
|
|||
|
|
|||
|
(S:RWED,0:RWED,G:RWE,W)
|
|||
|
|
|||
|
Format
|
|||
|
|
|||
|
CREATE/RIGHTS
|
|||
|
|
|||
|
Qualifiers: Format CREAT/(PROXY or RIGHTS)/qualifier
|
|||
|
/SYSTEM_ID=(integer list)
|
|||
|
Specifies the system ID quadword. Only the first two integers
|
|||
|
are used. The first integer becomes the first longword of the
|
|||
|
system ID, and the second integer the second longword. If only
|
|||
|
one integer is specified, the second longword is set to 0.
|
|||
|
|
|||
|
DEFAULT
|
|||
|
--------------------
|
|||
|
This command enables the user to change any field(s) in the DEFAULT
|
|||
|
record in SYSUAF.DAT.
|
|||
|
|
|||
|
Format:
|
|||
|
|
|||
|
DEFAULT /qualifier [/qualifiers]
|
|||
|
|
|||
|
Qualifiers:
|
|||
|
(Same qualifiers as ADD)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
EXIT
|
|||
|
--------------------
|
|||
|
The EXIT command terminates AUTHORIZE and returns the user to command
|
|||
|
language level.
|
|||
|
|
|||
|
Format:
|
|||
|
|
|||
|
EXIT
|
|||
|
|
|||
|
|
|||
|
|
|||
|
GRANT
|
|||
|
--------------------
|
|||
|
The GRANT command grants an identifier name to a user UIC. The
|
|||
|
/IDENTIFIER is required.
|
|||
|
|
|||
|
Format
|
|||
|
|
|||
|
GRANT/IDENTIFIER id-name user-spec
|
|||
|
|
|||
|
Parameters:
|
|||
|
id-name
|
|||
|
|
|||
|
Specifies the identifier name (see the ADD/IDENTIFIER command).
|
|||
|
|
|||
|
user-spec
|
|||
|
|
|||
|
Is an identifier (UIC or non UIC format) that specifies the
|
|||
|
user (see the ADD/IDENTIFIER command).
|
|||
|
|
|||
|
Qualifier:
|
|||
|
|
|||
|
/ATTRIBUTES
|
|||
|
|
|||
|
/ATTRIBUTES=(keyword)
|
|||
|
|
|||
|
See the ADD/IDENTIFIER command.
|
|||
|
|
|||
|
Example:
|
|||
|
UAF> GRANT/IDENTIFIER INVENTORY [300,015]
|
|||
|
identifier INVENTORY granted to CRAMER
|
|||
|
|
|||
|
The command in this example grants the identifier INVENTORY to
|
|||
|
a user with the UIC [300,015]. The user becomes the holder of
|
|||
|
the identifier and any resources associated with it.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
HELP
|
|||
|
--------------------
|
|||
|
Lists and explains the AUTHORIZE commands and qualifiers.
|
|||
|
|
|||
|
Format
|
|||
|
|
|||
|
HELP [commmand-name]
|
|||
|
|
|||
|
Parameter:
|
|||
|
command-name
|
|||
|
|
|||
|
Name of an AUTHORIZE command.
|
|||
|
|
|||
|
Qualifier:
|
|||
|
qualifier-name
|
|||
|
|
|||
|
Name of an AUTHORIZE qualifier
|
|||
|
|
|||
|
|
|||
|
|
|||
|
LIST
|
|||
|
--------------------
|
|||
|
The LIST command outputs a listing file which gives information
|
|||
|
on the records specified. Unless otherwise specified by
|
|||
|
qualifiers, UAF records are listed.
|
|||
|
|
|||
|
Qualifiers:
|
|||
|
/BRIEF
|
|||
|
This qualifier will give an abbreviated listing of the desired record(s).
|
|||
|
/BRIEF is equivalent to /NOFULL.
|
|||
|
|
|||
|
|
|||
|
/FULL
|
|||
|
This qualifier gives complete information on the desired record(s).
|
|||
|
/FULL is equivalent to /NOBRIEF. /FULL is the default.
|
|||
|
|
|||
|
LIST/IDENTIFIER
|
|||
|
--------------------
|
|||
|
Creates a listing file (RIGHTLIST.LIS) to which identifier
|
|||
|
information is written.
|
|||
|
|
|||
|
Format
|
|||
|
|
|||
|
LIST/IDENTIFIER [id-name]
|
|||
|
|
|||
|
Parameter:
|
|||
|
id-name
|
|||
|
|
|||
|
Specifies an identifier name. If you omit the identifier name,
|
|||
|
you must specify /USER or /VALUE.
|
|||
|
|
|||
|
Qualifiers:
|
|||
|
/USER
|
|||
|
/USER=user-spec
|
|||
|
|
|||
|
Specifies one or more users whose identifiers are to be listed.
|
|||
|
User-spec may be a username or UIC. You can user the asterisk
|
|||
|
wildcard to specify multiple usernames or UICs: full use of
|
|||
|
the asterisk and percent wildcards is permitted for usernames;
|
|||
|
UICs must be in the form [*,*], [*,n], or [n,*]. A
|
|||
|
wildcard username specification (i.e., *) lists identifiers
|
|||
|
alphabetically by username; a wildcard UIC specification (i.e.,
|
|||
|
[*,*]) lists them numerically by UIC.
|
|||
|
|
|||
|
|
|||
|
/VALUE
|
|||
|
/VALUE=value-specifier
|
|||
|
|
|||
|
Specifies the value of the identifier to be listed. Valid
|
|||
|
formats for the value-specifier are:
|
|||
|
|
|||
|
IDENTIFIER:integer An integer value in the range of
|
|||
|
32768 to 268435455, or a
|
|||
|
hexadecimal number in the range
|
|||
|
%X00008000 to 0FFFFFFF
|
|||
|
|
|||
|
UIC:uic A uic value in the standard UIC
|
|||
|
format
|
|||
|
|
|||
|
Examples:
|
|||
|
|
|||
|
UAF> LIST/IDENTIFIER INVENTORY
|
|||
|
writing listing file
|
|||
|
listing file RIGHTSLIST.LIS complete
|
|||
|
|
|||
|
The command in this example generates a full listing for the
|
|||
|
identifier INVENTORY, including its value (in hexadecimal),
|
|||
|
holders, and attributes.
|
|||
|
|
|||
|
UAF> LIST/IDENTIFIER/USER=ANDERSON
|
|||
|
writing listing file
|
|||
|
listing file SYSUAF.LIS complete
|
|||
|
|
|||
|
This command lists an identifier associated with the user
|
|||
|
ANDERSON, along with its value and attributes. Note, however,
|
|||
|
that this is the same result you would produce had you
|
|||
|
specified ANDERSON's UIC with the following forms of the
|
|||
|
command:
|
|||
|
|
|||
|
UAF> LIST/IDENTIFIER/USER=[300,015]
|
|||
|
|
|||
|
or
|
|||
|
|
|||
|
UAF> LIST/IDENTIFIER/VALUE=UIC:[300,015]
|
|||
|
|
|||
|
LIST/PROXY
|
|||
|
--------------------
|
|||
|
Creates a listing file of all the network UAF records. The
|
|||
|
/PROXY qualifier is required.
|
|||
|
|
|||
|
Format
|
|||
|
|
|||
|
LIST/PROXY
|
|||
|
|
|||
|
Example:
|
|||
|
|
|||
|
UAF> LIST/PROXY
|
|||
|
writing listing file
|
|||
|
listing file NETUAF.LIS complete
|
|||
|
|
|||
|
The command in this example creates a listing file of all the
|
|||
|
network UAF records.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
LIST/RIGHTS
|
|||
|
--------------------
|
|||
|
Lists the holders of the specified identifier, or, if /USER is
|
|||
|
specified, all identifiers held by the specified user(s).
|
|||
|
|
|||
|
Format
|
|||
|
|
|||
|
LIST/RIGHTS [id-name]
|
|||
|
|
|||
|
Parameter:
|
|||
|
id-name
|
|||
|
|
|||
|
This is the name of the identifier (usually the username) associated
|
|||
|
with the user. If id-name is omitted, you must specify the
|
|||
|
/USER qualifier.
|
|||
|
|
|||
|
Qualifier:
|
|||
|
/USER
|
|||
|
/USER=user-spec
|
|||
|
|
|||
|
Specifies a user whose identifiers are to be listed. User-spec
|
|||
|
may be a username or UIC. You can use the asterisk wildcard to
|
|||
|
specify multiple usernames or UICs: full user of the asterisk
|
|||
|
and percent wildcards is permitted for usernames; UICs must be
|
|||
|
in the form [*,*], [n,*], [n,n] or [*,n]. A wildcard username
|
|||
|
specification (i.e., *) or wildcard UIC specification (i.e.,
|
|||
|
[*,*]) lists all identifiers held by users. The wildcard
|
|||
|
username specification lists holders' usernames alphabetically;
|
|||
|
the wildcard UIC specification lists them in the numerical
|
|||
|
order of their UICs.
|
|||
|
|
|||
|
Example:
|
|||
|
UAF> LIST/RIGHTS PAYROLL
|
|||
|
writing listing file
|
|||
|
listing file RIGHTSLIST.LIS is complete
|
|||
|
|
|||
|
The command is this example creates a listing file of all
|
|||
|
holders of the identifier PAYROLL.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
MODIFY
|
|||
|
--------------------
|
|||
|
This command allows the user to change any field(s) in any user authorization
|
|||
|
record(s). Wildcarding of usernames or UICs is allowed.
|
|||
|
|
|||
|
Format:
|
|||
|
|
|||
|
MODIFY user-spec /qualifier [/qualifiers]
|
|||
|
|
|||
|
Qualifier's:
|
|||
|
The MODIFY qualifiers are very similar to the ADD qualifiers with the
|
|||
|
following exceptions:
|
|||
|
|
|||
|
/[NO]MODIFY_IDENTIFIER rather than /[NO]ADD_IDENTIFIER with the same
|
|||
|
parameters
|
|||
|
|
|||
|
|
|||
|
/ASTLM
|
|||
|
/ASTLM=value
|
|||
|
|
|||
|
Specifies the AST queue limit, which is the total number of asynchronous
|
|||
|
system trap operations and scheduled wakeup requests that can be
|
|||
|
outstanding at one time for the user.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
MODIFY/IDENTIFIER
|
|||
|
--------------------
|
|||
|
Modifies an identifier in the rights database.
|
|||
|
|
|||
|
Format
|
|||
|
|
|||
|
MODIFY/IDENTIFIER id-name
|
|||
|
|
|||
|
Parameter:
|
|||
|
id-name
|
|||
|
|
|||
|
Specifies the name of an identifier to be modified
|
|||
|
|
|||
|
Qualifiers:
|
|||
|
/ATTRIBUTES
|
|||
|
|
|||
|
/ATTRIBUTES=(keyword)
|
|||
|
|
|||
|
Specifies attributes to be associated with the modified
|
|||
|
identifier. Valid keywords are:
|
|||
|
|
|||
|
[NO]DYNAMIC Indicates whether or not unprivileged holders of the
|
|||
|
identifier may add or remove the identifier from the
|
|||
|
process rights list. The default is NODYNAMIC.
|
|||
|
|
|||
|
[NO]RESOURCE Indicates whether or not holders of the identifier
|
|||
|
may charge resources to it. The default is NORESOURCE.
|
|||
|
|
|||
|
If you specify RESOURCE, a holder named with the /HOLDER
|
|||
|
qualifier gains the right to charge resources to the
|
|||
|
identifier. If you specify /NORESOURCE, the holder loses the
|
|||
|
right to charge resources. If you specify NORESOURCE and do
|
|||
|
not name any holder (if /HOLDER is not specified), all holders
|
|||
|
lose the right to charge resources.
|
|||
|
|
|||
|
|
|||
|
/HOLDER
|
|||
|
|
|||
|
/HOLDER=username
|
|||
|
|
|||
|
Specifies the holder of an identifier whose attributes are to
|
|||
|
modified. /HOLDER is used only in conjunction with
|
|||
|
/ATTRIBUTES qualifier. If you specify /HOLDER, the /NAME and
|
|||
|
/VALUE qualifiers are ignored.
|
|||
|
|
|||
|
|
|||
|
/NAME
|
|||
|
|
|||
|
/NAME=id-name
|
|||
|
|
|||
|
Specifies a new id-name to be associated with the identifier.
|
|||
|
|
|||
|
|
|||
|
/VALUE
|
|||
|
|
|||
|
/VALUE=value-specifier
|
|||
|
|
|||
|
Specifies a new identifier value. Note, however, that an
|
|||
|
identifier value cannot be modified from a UIC to a non UIC
|
|||
|
format or vice versa. Valid formats for the value-specifier
|
|||
|
are:
|
|||
|
|
|||
|
IDENTIFIER:integer An integer value in the range of
|
|||
|
32768 to 268435455, or a
|
|||
|
hexadecimal number in the range
|
|||
|
%X00008000 to 0FFFFFFF
|
|||
|
|
|||
|
UIC:uic A uic value in the standard UIC
|
|||
|
format
|
|||
|
|
|||
|
Examples:
|
|||
|
UAF> MODIFY/IDENTIFIER/VALUE=UIC:[300,21] ACCOUNTING
|
|||
|
identifier ACCOUNTING modified
|
|||
|
|
|||
|
The command in this example changes the old UIC value of the
|
|||
|
identifier ACCOUNTING to a new value.
|
|||
|
|
|||
|
UAF> MODIFY/IDENTIFIER/ATTRIBUTES=NORESOURCE/HOLDER=ALLISON ACCOUNTING
|
|||
|
identifier ACCOUNTING modified
|
|||
|
|
|||
|
The command in this example associates the attribute NORESOURCE
|
|||
|
with the identifier ACCOUNTING in ALLISON's holder record.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
MODIFY/SYSTEM_PASSWORD
|
|||
|
Sets the system password.
|
|||
|
|
|||
|
Format
|
|||
|
|
|||
|
MODIFY/SYSTEM_PASSWORD=system-password
|
|||
|
|
|||
|
Parameters:
|
|||
|
user-spec
|
|||
|
|
|||
|
The record(s) to be modified may be specified in a variety of ways:
|
|||
|
|
|||
|
1) wildcarded username (standard DCL wildcarding)
|
|||
|
2) wildcarded UIC, as
|
|||
|
a) [*,*]
|
|||
|
b) [*,n]
|
|||
|
c) [n,*]
|
|||
|
3) specific username
|
|||
|
4) specific UIC
|
|||
|
|
|||
|
|
|||
|
|
|||
|
REMOVE
|
|||
|
--------------------
|
|||
|
This command will remove a user authorization record from SYSUAF.DAT.
|
|||
|
|
|||
|
Format for removing a record from SYSUAF.DAT:
|
|||
|
|
|||
|
REMOVE username
|
|||
|
|
|||
|
Parameters:
|
|||
|
username
|
|||
|
|
|||
|
username is the name of the authorization record to be removed from
|
|||
|
SYSUAF.DAT.
|
|||
|
|
|||
|
Qualifiers:
|
|||
|
/REMOVE_IDENTIFIER
|
|||
|
|
|||
|
/[NO]REMOVE_IDENTIFIER
|
|||
|
|
|||
|
Controls whether the identifier corresponding to the specified username
|
|||
|
in the rights database is removed. The default is /REMOVE_IDENTIFIER.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
REMOVE/IDENTIFIER
|
|||
|
--------------------
|
|||
|
Removes an identifier from the rights database.
|
|||
|
|
|||
|
Format
|
|||
|
|
|||
|
REMOVE/IDENTIFIER id-name
|
|||
|
|
|||
|
Parameter:
|
|||
|
id-name
|
|||
|
|
|||
|
Specifies the name of an identifier in the rights database.
|
|||
|
|
|||
|
Example:
|
|||
|
UAF> REMOVE/IDENTIFIER Q1SALES
|
|||
|
record removed from RIGHTSLIST.DAT
|
|||
|
|
|||
|
The command in this example deletes the identifier Q1SALES from
|
|||
|
the rights database.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
REMOVE/PROXY
|
|||
|
--------------------
|
|||
|
This qualifier changes the context of REMOVE command. Its presence
|
|||
|
indicates that the intention is to remove a record from the Proxy
|
|||
|
Login File, NETUAF.DAT. The format for removing a record from
|
|||
|
NETUAF.DAT is
|
|||
|
|
|||
|
REMOVE/PROXY node::remoteusername
|
|||
|
|
|||
|
where "node::remoteusername" is an entry in NETUAF.DAT for the local node.
|
|||
|
|
|||
|
|
|||
|
RENAME
|
|||
|
This command will change the username for a record in the user authorization
|
|||
|
file, SYSUAF.DAT. The only parameter qualifier allowed for the RENAME
|
|||
|
command is the /PASSWORD qualifier.
|
|||
|
|
|||
|
|
|||
|
Format:
|
|||
|
|
|||
|
RENAME old-username new-username [/PASSWORD=password]
|
|||
|
|
|||
|
Qualifiers:
|
|||
|
/GENERATE
|
|||
|
|
|||
|
/GENERATE
|
|||
|
/GENERATE=CURRENT
|
|||
|
/GENERATE=PRIMARY
|
|||
|
/GENERATE=SECONDARY
|
|||
|
/GENERATE=BOTH
|
|||
|
/GENERATE=ALL
|
|||
|
|
|||
|
Generate a random password. The formats of the passwords is the same
|
|||
|
as for the DCL SET PASSWORD /GENERATE command.
|
|||
|
|
|||
|
/MODIFY_IDENTIFIER
|
|||
|
|
|||
|
/[NO]MODIFY_IDENTIFIER
|
|||
|
|
|||
|
Controls whether the identifier corresponding to the specified username
|
|||
|
in the rights database is modified. The default is /MODIFY_IDENTIFIER.
|
|||
|
|
|||
|
/PASSWORD
|
|||
|
|
|||
|
/PASSWORD=(password [,password2])
|
|||
|
/NOPASSWORD
|
|||
|
|
|||
|
Password(s) for login. Must be from 0 to 31 characters in length, and
|
|||
|
must be composed of alphanumeric characters, dollar signs, and underscores.
|
|||
|
|
|||
|
To set the first password with no second password, specify
|
|||
|
|
|||
|
/PASSWORD=password
|
|||
|
|
|||
|
To set both passwords, specify
|
|||
|
|
|||
|
/PASSWORD=(password, password2)
|
|||
|
|
|||
|
To set only the first password leaving the second alone, specify
|
|||
|
|
|||
|
/PASSWORD=(password, "")
|
|||
|
|
|||
|
To set only the second password leaving the first alone, specify
|
|||
|
|
|||
|
/PASSWORD=("", password2)
|
|||
|
|
|||
|
To clear the second password leaving the first alone, specify
|
|||
|
|
|||
|
/PASSWORD=""
|
|||
|
|
|||
|
To clear both passwords, specify
|
|||
|
|
|||
|
/NOPASSWORD
|
|||
|
|
|||
|
It is important to specify new passwords for a renamed record. Since
|
|||
|
the user name is taken as part of the input for password verification,
|
|||
|
the old password with the new user name will not yield the same result
|
|||
|
as the original password and user name, and the verification will fail.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
RENAME/IDENTIFIER
|
|||
|
--------------------
|
|||
|
Renames an identifier in the rights database.
|
|||
|
|
|||
|
Format
|
|||
|
|
|||
|
RENAME/IDENTIFIER old-id-name new-id-name
|
|||
|
|
|||
|
Parameters:
|
|||
|
old-id-name
|
|||
|
|
|||
|
Specifies the name of an identifier to be renamed.
|
|||
|
|
|||
|
new-id-name
|
|||
|
|
|||
|
Specifies the new identifier name.
|
|||
|
|
|||
|
Example:
|
|||
|
|
|||
|
UAF> RENAME/IDENTIFIER Q1SALES Q2SALES
|
|||
|
identifier Q1SALES renamed
|
|||
|
|
|||
|
The command in this example renames the identifier Q1SALES to
|
|||
|
Q2SALES.
|
|||
|
|
|||
|
|
|||
|
Parameters
|
|||
|
old-username new-username
|
|||
|
|
|||
|
"old-username" is the username for the authorization record which is to
|
|||
|
be renamed. "new-username" is the new username for the record.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
REVOKE
|
|||
|
--------------------
|
|||
|
Revokes an identifier name from a username or UIC identifier.
|
|||
|
The /IDENTIFIER qualifier is required.
|
|||
|
|
|||
|
Format
|
|||
|
|
|||
|
REVOKE/IDENTIFIER id-name user-spec
|
|||
|
|
|||
|
Parameters:
|
|||
|
id-name
|
|||
|
|
|||
|
Specifies the identifier name (see the ADD/IDENTIFIER command).
|
|||
|
|
|||
|
user-spec
|
|||
|
|
|||
|
Is an identifier (UIC or non UIC format) that specifies the
|
|||
|
user (see the ADD/IDENTIFIER command).
|
|||
|
|
|||
|
|
|||
|
|
|||
|
SHOW
|
|||
|
--------------------
|
|||
|
The SHOW command outputs a listing of the specified
|
|||
|
authorization record(s) to the user's terminal. Unless otherwise
|
|||
|
specified by qualifiers, UAF records are listed.
|
|||
|
|
|||
|
Format for the authorization file:
|
|||
|
|
|||
|
SHOW [/qualifiers] user-spec
|
|||
|
|
|||
|
Qualifiers:
|
|||
|
/BRIEF
|
|||
|
This qualifier will give an abbreviated listing of the desired record(s).
|
|||
|
/BRIEF is equivalent to /NOFULL. /BRIEF is the default.
|
|||
|
|
|||
|
/FULL
|
|||
|
This qualifier gives complete information on the desired record(s).
|
|||
|
/FULL is equivalent to /NOBRIEF.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
SHOW/IDENTIFIER
|
|||
|
--------------------
|
|||
|
Displays information about the identifier on the current
|
|||
|
SYS$OUTPUT device.
|
|||
|
|
|||
|
Format
|
|||
|
|
|||
|
SHOW/IDENTIFIER [id-name]
|
|||
|
|
|||
|
Parameter:
|
|||
|
id-name
|
|||
|
|
|||
|
Specifies an identifier name. If you omit the identifier name,
|
|||
|
you must specify /USER or /VALUE.
|
|||
|
|
|||
|
Qualifiers:
|
|||
|
/BRIEF
|
|||
|
This qualifier will give an abbreviated listing of the desired record(s).
|
|||
|
/BRIEF is equivalent to /NOFULL. /BRIEF is the default.
|
|||
|
|
|||
|
|
|||
|
/FULL
|
|||
|
This qualifier gives complete information on the desired record(s).
|
|||
|
/FULL is equivalent to /NOBRIEF.
|
|||
|
/USER
|
|||
|
|
|||
|
|
|||
|
/USER=user-spec
|
|||
|
|
|||
|
Specifies one or more users whose identifiers are to be
|
|||
|
displayed. User-spec may be XH].+++lKU%9@You can use
|
|||
|
the asterisk wildcard to specify multiple usernames or UICs:
|
|||
|
full use of the asterisk and percent wildcards is permitted for
|
|||
|
usernames; UICs must be in the form [*,*], [*,n], [n,*], or
|
|||
|
[n,n]. A wildcard username specification (i.e., *) displays
|
|||
|
identifiers alphabetically by username; a wildcard UIC
|
|||
|
specification (i.e., [*,*]) displays them numerically by UIC.
|
|||
|
|
|||
|
|
|||
|
/VALUE
|
|||
|
/VALUE=value-specifier
|
|||
|
|
|||
|
Specifies the value of the identifier to be listed. Valid
|
|||
|
formats for the value-specifier are:
|
|||
|
|
|||
|
IDENTIFIER:integer An integer value in the range of
|
|||
|
32768 to 268435455, or a
|
|||
|
hexadecimal number in the range
|
|||
|
%X00008000 to 0FFFFFFF
|
|||
|
|
|||
|
UIC:uic A uic value in the standard UIC
|
|||
|
format
|
|||
|
|
|||
|
SHOW/PROXY
|
|||
|
Displays one or all records in the network UAF. The /PROXY
|
|||
|
qualifier is required.
|
|||
|
|
|||
|
Format
|
|||
|
|
|||
|
SHOW/PROXY node::remote-user
|
|||
|
|
|||
|
Parameters:
|
|||
|
node
|
|||
|
|
|||
|
Specifies the name of a network node in the network UAF. The
|
|||
|
asterisk wildcard is permitted in the node specification.
|
|||
|
|
|||
|
remote-user
|
|||
|
|
|||
|
Specifies the name of a user on a remote node. The asterisk
|
|||
|
wildcard is permitted in the remote-user specification.
|
|||
|
|
|||
|
SHOW/RIGHTS
|
|||
|
Displays the names, values, and attributes of all identifiers
|
|||
|
held by the specified user(s).
|
|||
|
|
|||
|
Format
|
|||
|
|
|||
|
SHOW/RIGHTS [user-spec]
|
|||
|
|
|||
|
Parameter:
|
|||
|
user-spec
|
|||
|
|
|||
|
Is the name of the identifier (usually the username) associated
|
|||
|
with the user in SYSUAF.DAT. If user-spec is omitted, you must
|
|||
|
specify the /USER qualifier.
|
|||
|
|
|||
|
Qualifier:
|
|||
|
/USER
|
|||
|
|
|||
|
/USER=user-spec
|
|||
|
|
|||
|
Specifies one or more users whose identifiers are to be
|
|||
|
displayed. User-spec may be a username or UIC. You can use
|
|||
|
the asterisk wildcard to specify multiple usernames or UICs:
|
|||
|
full use of the asterisk and percent wildcards is permitted for
|
|||
|
usernames; UICs must be in the form [*,*], [*,n], [n,*], or
|
|||
|
[n,n]. A wildcard username specification (i.e., *) displays
|
|||
|
identifiers alphabetically by username; a wildcard UIC
|
|||
|
specification (i.e., [*,*]) displays them numerically by UIC.
|
|||
|
|
|||
|
|
|||
|
Parameters:
|
|||
|
|
|||
|
If a listing is generated from SYSUAF.DAT, then the user may specify
|
|||
|
"user-spec" in a variety of ways:
|
|||
|
|
|||
|
1) wildcarded username (standard DCL wildcarding)
|
|||
|
|
|||
|
2) wildcarded UIC, as
|
|||
|
a) [*,*]
|
|||
|
b) [*,n]
|
|||
|
c) [n,*]
|
|||
|
3) specific username
|
|||
|
4) specific UIC.
|
|||
|
|
|||
|
|
|||
|
Phew! After all that, you should be doing just fine using the Authorize
|
|||
|
Utility. You can expect summaries of VMS commands, DCL, and other VAX infor-
|
|||
|
mation in future articles. Now, happy hacking and go play God for a while!
|
|||
|
|
|||
|
______________________________________________________________________________
|
|||
|
$
|