1650 lines
43 KiB
Plaintext
1650 lines
43 KiB
Plaintext
|
||
______________________________________________________________________________
|
||
|
||
Using the VAX/VMS Authorize Utility
|
||
Written by Line Shadow on 09/10/88
|
||
|
||
A Telecom Computer Security Bulletin File
|
||
Volume One, Number 1, File 9 of 12
|
||
______________________________________________________________________________
|
||
|
||
|
||
Time to play God with your favorite
|
||
___ ___ ___ ___ ___ ___ ___
|
||
| | | | | | | |
|
||
| d | i | g | i | t | a | l |
|
||
|___|___|___|___|___|___|___|
|
||
|
||
VAX/VMS System
|
||
|
||
|
||
In order to put this article to good use, you will have to acquire a high
|
||
priviledged VAX account. I'm leaving that up to you, as this article is
|
||
intended for the more advanced VAX hacker. You can expect another article
|
||
discussing the tricks of the trade as regards getting an account with
|
||
priviledges of that sort in future articles. Until then, you're on your own.
|
||
|
||
This is a reference on how to use a powerful utility within VMS that will
|
||
allow you to create accounts on a digital VAX system. This utility, called the
|
||
Authorize Utility is located on every VAX system. It can be found in the
|
||
SYS$SYSTEM directory (which is a logical name for SYS$SYSROOT:[SYSEXE]) under
|
||
the filename AUTHORIZE.EXE. This is the actual program and you just RUN it.
|
||
Along with tons of other files within SYS$SYSTEM, you will find two other files
|
||
that are manipulated by the Authorize Utility.
|
||
|
||
|
||
Quick definitions for the Command Syntax:
|
||
===============================================================================
|
||
|
||
Qualifier - A qualifier is an optional extension of a main command
|
||
(discussed below) whose format consists of:
|
||
command/qualifier
|
||
|
||
Use of brackets - Use of brackets ('[' and ']') placed around a logical-
|
||
name indicates that the enclosed item is optional.
|
||
Except in the case of specifying directories which
|
||
has to have the brackets around the directory name.
|
||
Also note that parenthesis arounf a logical name are
|
||
required when noted as such.
|
||
|
||
file-spec,... - Indicates that additional parameters, values, or
|
||
information can be entered.
|
||
|
||
-------------------------------------------------------------------------------
|
||
Command Syntax: UAF> command [parameter]
|
||
===============================================================================
|
||
|
||
ADD
|
||
/[NO]ACCESS[=(range[,...])]
|
||
/ACCOUNT=account-name
|
||
/[NO]ADD_IDENTIFIER
|
||
/ATTRIBUTES=(keyword[,...])
|
||
/[NO]BATCH[=(range[,...])]
|
||
/BIOLM=value
|
||
/BYTLM=value
|
||
/CLI=cli-name
|
||
/CLITABLES=clitable-name
|
||
/CPUTIME=time
|
||
/DEFPRIVILEGES=([NO]privname[,...])
|
||
/DEVICE=name
|
||
/[NO]DIALUP[=(range[,...])]
|
||
/DIOLM=value
|
||
/DIRECTORY=directory-name
|
||
/ENQLM=value
|
||
/EXPIRATION=time
|
||
/FILLM=value
|
||
/GENERATE_PASSWORD[=keyword]
|
||
/FLAGS=([NO]option[,...])
|
||
/[NO]INTERACTIVE[=(range[,...])]
|
||
/JTQUOTA=value
|
||
/LGICMD=file-spec
|
||
/[NO]LOCAL[=(range[,...])]
|
||
/MAXACCTJOBS=value
|
||
/MAXDETACH=value
|
||
/MAXJOBS=value
|
||
/[NO]NETWORK[=(range[,...])]
|
||
/OWNER=owner-name
|
||
/[NO]PASSWORD=(password[,password2])
|
||
/PFLAGS=([NO]option[,...])
|
||
/PGFLQUOTA=value
|
||
/PRCLM=value
|
||
/P_RESTRICT=(range[,...])
|
||
/PRIMEDAYS=([NO]day[,...])
|
||
/PRIORITY=value
|
||
/PRIVILEGES=([NO]privname[,...])
|
||
/[NO]PWDEXPIRED
|
||
/[NO]PWDLIFETIME=time
|
||
/PWDMINIMUM=value
|
||
/QUEPRIORITY=value
|
||
/[NO]REMOTE[=(range[,...])]
|
||
/SFLAGS=([NO]option[,...])
|
||
/SHRFILLM=value
|
||
/S_RESTRICT=(range[,...])
|
||
/TQELM=value
|
||
/UIC=uic
|
||
/WSDEFAULT=value
|
||
/WSEXTENT=value
|
||
/WSQUOTA=value
|
||
ADD/IDENTIFIER
|
||
/ATTRIBUTES=(keyword[,...])
|
||
/USER=user-spec
|
||
/VALUE=value-specifier
|
||
ADD/PROXY
|
||
COPY
|
||
(Same qualifiers as ADD)
|
||
CREATE/PROXY
|
||
CREATE/RIGHTS
|
||
DEFAULT
|
||
(Same qualifiers as ADD)
|
||
EXIT
|
||
GRANT/IDENTIFIER
|
||
/ATTRIBUTES=(keyword[,...])
|
||
HELP
|
||
(All commands and qualifiers)
|
||
LIST
|
||
/BRIEF
|
||
/FULL
|
||
LIST/IDENTIFIER
|
||
/BRIEF
|
||
/FULL
|
||
/USER=user-spec
|
||
/VALUE=value-specifier
|
||
LIST/PROXY
|
||
LIST/RIGHTS
|
||
/USER=user-spec
|
||
MODIFY
|
||
/[NO]ACCESS[=(range[,...])]
|
||
/ACCOUNT=account-name
|
||
/ASTLM=value
|
||
/[NO]BATCH[=(range[,...])]
|
||
/BIOLM=value
|
||
/BYTLM=value
|
||
/CLI=cli-name
|
||
/CLITABLES=clitable-name
|
||
/CPUTIME=time
|
||
/DEFPRIVILEGES=([NO]privname[,...])
|
||
/DEVICE=name
|
||
/[NO]DIALUP[=(range[,...])]
|
||
/DIOLM=value
|
||
/DIRECTORY=directory-name
|
||
/ENQLM=value
|
||
/EXPIRATION=time
|
||
/FILLM=value
|
||
/FLAGS=([NO]option[,...])
|
||
/[NO]INTERACTIVE[=(range[,...])]
|
||
/JTQUOTA=value
|
||
/LGICMD=file-spec
|
||
/[NO]LOCAL[=(range[,...])]
|
||
/MAXACCTJOBS=value
|
||
/MAXDETACH=value
|
||
/MAXJOBS=value
|
||
/[NO]MODIFY_IDENTIFIER
|
||
/[NO]NETWORK[=(range[,...])]
|
||
/OWNER=owner-name
|
||
/PASSWORD=(password[,password2])
|
||
/PFLAGS=([NO]option[,...])
|
||
/PGFLQUOTA=value
|
||
/PRCLM=value
|
||
/P_RESTRICT=(range[,...])
|
||
/PRIMEDAYS=([NO]day[,...])
|
||
/PRIORITY=value
|
||
/PRIVILEGES=([NO]privname[,...]!
|
||
/[NO]PWDEXPIRED
|
||
/[NO]PWDLIFETIME=time
|
||
/PWDMINIMUM=value
|
||
/QUEPRIORITY=value
|
||
/[NO]REMOTE[=(range[,...])]
|
||
/SFLAGS=([NO]option[,...])
|
||
/SHRFILLM=value
|
||
/S_RESTRICT=(range[,...])
|
||
/TQELM=value
|
||
/UIC=uic
|
||
/WSDEFAULT=value
|
||
/WSEXTENT=value
|
||
/WSQUOTA=value
|
||
MODIFY/IDENTIFIER
|
||
/ATTRIBUTES=(keyword[,...])
|
||
/HOLDER=holder-name
|
||
/NAME=id-name
|
||
/VALUE=value-specifier
|
||
MODIFY/SYSTEM_PASSWORD=system-password
|
||
REMOVE
|
||
/[NO]REMOVE_IDENTIFIER
|
||
REMOVE/PROXY
|
||
RENAME
|
||
/PASSWORD[=(password[,password2])]
|
||
/[NO]MODIFY_IDENTIFIER
|
||
RENAME/IDENTIFIER
|
||
REVOKE/IDENTIFIER
|
||
SHOW
|
||
/BRIEF
|
||
SHOW/IDENTIFIER
|
||
/BRIEF
|
||
/FULL
|
||
/USER=user-spec
|
||
/VALUE=value-specifier
|
||
SHOW/PROXY
|
||
SHOW/RIGHTS
|
||
/USER=user-spec
|
||
-------------------------------------------------------------------------------
|
||
Description:
|
||
===============================================================================
|
||
|
||
Using Authorize, you control access to the system and its resources by
|
||
|
||
o Creating new records and modifying existing records in the system user
|
||
authorization file (SYS$SYSTEM:SYSUAF.DAT) and the network user
|
||
authorization file (SYS$SYSTEM:NETUAF.DAT)
|
||
|
||
o Creating new records and modifying existing records in the rights
|
||
database file (SYS$SYSTEM:RIGHTSLIST.DAT)
|
||
|
||
-------------------------------------------------------------------------------
|
||
Command Summary:
|
||
===============================================================================
|
||
|
||
ADD
|
||
--------------------
|
||
The ADD command will create a new entry in the user authorization file.
|
||
|
||
Format for creating new entries in SYSUAF.DAT:
|
||
|
||
ADD newusername [/qualifiers]
|
||
|
||
Qualifiers:
|
||
/ACCESS
|
||
|
||
/[NO]ACCESS=([PRIMARY], [n-m], [n] [,...] [SECONDARY], [n-m], [n] [,...])
|
||
/[NO]ACCESS="[PRIMARY][:] [n-m][,] [n][,...][;] [SECONDARY][:] [n-m][,...]"
|
||
|
||
Used to specify hours of access for all modes of logins. Specify hours
|
||
as integers from 0 to 23, inclusive. Hours may be specified as single
|
||
hours (n), or as ranges of hours (n-m). If the ending hour of a range
|
||
is earlier than the starting hour, the range extends from the starting
|
||
hour through midnight to the the ending hour. The first set of hours
|
||
after the keyword PRIMARY specifies hours on primary days; the second
|
||
set of hours after the keyword SECONDARY specifies hours on secondary
|
||
days.
|
||
|
||
All the list elements are optional. If no hours are specified for a
|
||
day type, access is permitted the entire day. If only primary hours
|
||
or only secondary hours are given, no access is permitted for secondary
|
||
or primary days, respectively. If hours are given with no day type, they
|
||
apply to both types of days.
|
||
|
||
Negating the qualifier by specifying /NOACCESS=(...) completely inverts
|
||
the sense of the access hours.
|
||
|
||
Examples:
|
||
|
||
/ACCESS allows unrestricted access
|
||
/NOACCESS=SECONDARY allows access on primary days only
|
||
/ACCESS=(9-17) allows access from 9am through 5 pm on all days
|
||
/NOACCESS=(PRIMARY, 9-17, SECONDARY, 18-8)
|
||
allows access from 9 through 5 on secondary days
|
||
and all but 9 through 5 on primary days
|
||
/ACCESS="Primary: 9-16; Secondary: 18-7, 8; Primary: 17"
|
||
allows access from 9 through 5 on primary days
|
||
and all but 9 through 5 on secondary days
|
||
|
||
To specify access hours for specific types of logins, see the
|
||
/BATCH, /NETWORK, /INTERACTIVE, /LOCAL, /DIALUP, and /REMOTE qualifiers.
|
||
|
||
|
||
/ACCOUNT
|
||
|
||
/ACCOUNT=account-name
|
||
|
||
Specifies a default account name. This field is often used for billing
|
||
purposes, and should consist of 1 through 8 characters.
|
||
|
||
|
||
/ADD_IDENTIFIER
|
||
|
||
/[NO]ADD_IDENTIFIER
|
||
|
||
Controls whether an identifier corresponding to the specified username
|
||
and UIC is added to the rights database. The default is /ADD_IDENTIFIER.
|
||
|
||
|
||
/ASTLM
|
||
|
||
/ASTLM=n
|
||
|
||
Specifies the AST queue limit, which is the total number of asynchronous
|
||
system trap operations and scheduled wakeup requests that can be
|
||
outstanding at one time for the user.
|
||
|
||
|
||
/BATCH
|
||
|
||
/[NO]BATCH=([PRIMARY], [n-m], [n] [,...] [SECONDARY], [n-m], [n] [,...])
|
||
/[NO]BATCH="[PRIMARY][:] [n-m][,] [n][,...][;] [SECONDARY][:] [n-m][,...]"
|
||
|
||
Specifies hours of access permitted for batch jobs. For a detailed
|
||
description of the interpretation of the access specification, see the
|
||
/ACCESS qualifier.
|
||
|
||
|
||
/BIOLM
|
||
|
||
/BIOLM=n
|
||
|
||
Specifies the total buffered I/O operations that can be outstanding
|
||
at one time.
|
||
|
||
|
||
/BYTLM
|
||
|
||
/BYTLM=n
|
||
|
||
Total number of bytes that can be specified for transfer in
|
||
outstanding buffered I/O operations.
|
||
|
||
|
||
/CLI
|
||
|
||
/CLI=cli-name
|
||
|
||
Name of the default command interpreter.
|
||
|
||
|
||
/CLITABLES
|
||
|
||
/CLITABLES=table-name
|
||
|
||
Name of the default command interpreter tables.
|
||
|
||
|
||
/CPUTIME
|
||
|
||
/CPUTIME=delta-time
|
||
|
||
Maximum amount of CPU time a user process can take per session. The
|
||
unit of time must be in delta format. 0 means infinite.
|
||
|
||
|
||
/DEFPRIVILEGES
|
||
|
||
/DEFPRIVILEGES=([NO]privname [,...])
|
||
|
||
Specifies the default privileges for the user (i.e., those enabled
|
||
at login time). A NO prefix removes this privilege from the user;
|
||
specifying a privilege without the NO prefix allows the user that
|
||
privilege.
|
||
|
||
There are many privileges available with varying degrees of power and
|
||
potential system impact. Please see the VAX/VMS System Manager's
|
||
Reference Manual for a more detailed discussion of the available
|
||
privileges.
|
||
|
||
|
||
/DEVICE
|
||
|
||
/DEVICE=device-name
|
||
|
||
Name of default device (must be a direct access device) from one to
|
||
fifteen characters. The colon is automatically added if omitted.
|
||
A blank device is interpreted as SYS$SYSDISK.
|
||
|
||
|
||
/DIALUP
|
||
|
||
/[NO]DIALUP=([PRIMARY], [n-m], [n] [,...] [SECONDARY], [n-m], [n] [,...])
|
||
/[NO]DIALUP="[PRIMARY][:] [n-m][,] [n][,...][;] [SECONDARY][:] [n-m][,...]"
|
||
|
||
Specifies hours of access permitted for interactive login via dialup
|
||
terminals. For a detailed description of the interpretation of the
|
||
access specification, see the /ACCESS qualifier.
|
||
|
||
|
||
/DIOLM
|
||
|
||
/DIOLM=n
|
||
|
||
Total direct (usually disk) I/O operations that can be outstanding at
|
||
one time.
|
||
|
||
|
||
/DIRECTORY
|
||
|
||
/DIRECTORY=directory-name
|
||
|
||
Name of default login directory. Brackets (either [] or <>) must be
|
||
supplied.
|
||
|
||
|
||
/ENQLM
|
||
|
||
/ENQLM=n
|
||
|
||
Total number of lock requests which may be outstanding at one time.
|
||
|
||
|
||
/EXPIRATION
|
||
|
||
/EXPIRATION=time
|
||
|
||
Expiration date and time of the account. Specify as an absolute or
|
||
combination time.
|
||
|
||
|
||
/FILLM
|
||
|
||
/FILLM=n
|
||
|
||
Total number of files that can be open at one time, including active
|
||
network logical links.
|
||
|
||
|
||
/FLAGS
|
||
|
||
/FLAGS=([NO]option[,...])
|
||
|
||
Login flags for this user. Options which may be specified are:
|
||
|
||
[NO]AUDIT - [do not] audit all security relevant actions
|
||
[NO]AUTOLOGIN - [do not] restrict this account to autologins only
|
||
[NO]CAPTIVE - [do not] prevent user
|
||
[NO]DEFCLI - [do not] prevent user from changing default CLI
|
||
or CLI tables
|
||
[NO]DISCTLY - [do not] disable <CTRL/Y> interrupts
|
||
[NO]DISMAIL - [do not] prevent mail delivery to this user
|
||
[NO]DISNEWMAIL - [do not] suppress "New Mail..." announcements
|
||
[NO]DISRECONNECT-[do not] disable automated reconnections
|
||
[NO]DISREPORT - [do not] disable time of last login and other
|
||
security reports
|
||
[NO]DISUSER - [do not] disable this account completely
|
||
[NO]DISWELCOME - [do not] suppress "Welcome to..." login message
|
||
[NO]GENPWD - [do not] require user to use generated passwords
|
||
[NO]LOCKPWD - [do not] prevent user from changing password
|
||
[NO]PWD_EXPIRED- [do not] mark password as expired
|
||
[NO]PWD2_EXPIRED-[do not] mark second password as expired
|
||
|
||
|
||
/GENERATE
|
||
|
||
/GENERATE
|
||
/GENERATE=CURRENT
|
||
/GENERATE=PRIMARY
|
||
/GENERATE=SECONDARY
|
||
/GENERATE=BOTH
|
||
/GENERATE=ALL
|
||
|
||
Generate a random password. The formats of the passwords is the same
|
||
as for the DCL SET PASSWORD /GENERATE command.
|
||
|
||
|
||
/INTERACTIVE
|
||
|
||
/[NO]INTERACTIVE=([PRIMARY], [n-m], [n] [,...] [SECONDARY], [n-m], [n] [,...])
|
||
/[NO]INTERACTIVE="[PRIMARY][:] [n-m][,] [n][,...][;] [SECONDARY][:] [n][,...]"
|
||
|
||
Specifies hours of access permitted for interactive login via any
|
||
terminal. For a detailed description of the interpretation of the
|
||
/ACCESS qualifier.
|
||
|
||
/JTQUOTA
|
||
|
||
/JTQUOTA=n
|
||
|
||
Specifies the initial byte quota with which the job-wide logical name
|
||
table is to be created with.
|
||
|
||
|
||
/LGICMD
|
||
|
||
/LGICMD=filespec
|
||
|
||
Name of login command file. Default device and directory are used to
|
||
locate the command file.
|
||
|
||
|
||
/LOCAL
|
||
|
||
/[NO]LOCAL=([PRIMARY], [n-m], [n] [,...] [SECONDARY], [n-m], [n] [,...])
|
||
/[NO]LOCAL="[PRIMARY][:] [n-m][,] [n][,...][;] [SECONDARY][:] [n-m][,...]"
|
||
|
||
Specifies hours of access permitted for interactive login via local
|
||
terminals. For a detailed description of the interpretation of the
|
||
access specification, see the /ACCESS qualifier.
|
||
|
||
|
||
/MAXACCTJOBS
|
||
|
||
/MAXACCTJOBS=n
|
||
|
||
Interactive and detached processes
|
||
which may be active at one time for all users which are on the same
|
||
account as the user for which the qualifier is present.
|
||
|
||
|
||
/MAXDETACH
|
||
|
||
/MAXDETACH=n
|
||
|
||
Specifies the maximum number of detached processes with this username
|
||
that may be active at one time. Processes which cause this count to
|
||
be exceeded are terminated.
|
||
|
||
|
||
/MAXJOBS
|
||
|
||
/MAXJOBS=n
|
||
|
||
Maximum number of interactive, batch, and detached processes with this
|
||
username which can be active at one time. Processes which cause this
|
||
count to be exceeded are terminated.
|
||
|
||
|
||
/NETWORK
|
||
|
||
/[NO]NETWORK=([PRIMARY], [n-m], [n] [,...] [SECONDARY], [n-m], [n] [,...])
|
||
/[NO]NETWORK="[PRIMARY][:] [n-m][,] [n][,...][;] [SECONDARY][:] [n-m][,...]"
|
||
|
||
Specifies hours of access permitted for network jobs. For a detailed
|
||
description of the interpretation of the access specification, see the
|
||
/ACCESS qualifier.
|
||
|
||
|
||
/OWNER
|
||
|
||
/OWNER=owner-name
|
||
|
||
Name of owner for billing purposes, etc. May be from one to 31 characters.
|
||
|
||
|
||
/PASSWORD
|
||
|
||
/PASSWORD=(password [,password2])
|
||
/NOPASSWORD
|
||
|
||
Password(s) for login. Must be from 0 to 31 characters in length, and
|
||
must be composed of alphanumeric characters, dollar signs, and underscores.
|
||
|
||
To set the first password with no second password, specify
|
||
|
||
/PASSWORD=password
|
||
|
||
To set both passwords, specify
|
||
|
||
/PASSWORD=(password, password2)
|
||
|
||
To set only the first password leaving the second alone, specify
|
||
|
||
/PASSWORD=(password, "")
|
||
|
||
To set only the second password leaving the first alone, specify
|
||
|
||
/PASSWORD=("", password2)
|
||
|
||
To clear the second password leaving the first alone, specify
|
||
|
||
/PASSWORD=""
|
||
|
||
To clear both passwords, specify
|
||
|
||
/NOPASSWORD
|
||
|
||
|
||
/PBYTLM
|
||
|
||
/PBYTLM=n
|
||
|
||
Paged pool byte count limit.
|
||
|
||
|
||
/PFLAGS
|
||
|
||
/PFLAGS=([NO]option[,...])
|
||
|
||
This qualifier is obsolete and is retained for compatibility purposes.
|
||
For current usage, see the /ACCESS, etc., qualifiers.
|
||
Login flags for primary days. Options are:
|
||
|
||
[NO]DISDIALUP - [do not] prohibit user from dialing in
|
||
[NO]DISNETWORK - [do not] prohibit user from logging in via a
|
||
"SET HOST" command.
|
||
|
||
|
||
/PGFLQUOTA
|
||
|
||
/PGFLQUOTA=n
|
||
|
||
Total pages that this process can use in the system paging file. Should
|
||
be a minimum of 2048 for a typical interactive process.
|
||
|
||
|
||
/P_RESTRICT
|
||
|
||
/P_RESTRICT=(n-m[,...])
|
||
|
||
or
|
||
|
||
/P_RESTRICT=(n[,...])
|
||
|
||
This qualifier is obsolete and is retained for compatibility purposes.
|
||
For current usage, see the /ACCESS, etc., qualifiers.
|
||
Used to specify hours or ranges of hours to restrict user from logging in on
|
||
primary days.
|
||
|
||
/P_RESTRICT=(...) is roughly equivale7t to /NOACCESS=(PRIMARY, ...)
|
||
|
||
|
||
|
||
/PRCLM
|
||
|
||
/PRCLM=n
|
||
|
||
Total number of subprocesses that can exist at one time.
|
||
|
||
|
||
/PRIMEDAYS
|
||
|
||
/PRIMEDAYS=([NO]day[,...])
|
||
|
||
Used to define primary and secondary days. A day prefixed with NO becomes
|
||
a secondary day, and a day without the NO prefix is defined as a primary
|
||
day. Primary and secondary day definitions are used in conjunction with
|
||
the /ACCESS, etc., qualifiers.
|
||
|
||
|
||
/PRIORITY
|
||
|
||
/PRIORITY=n
|
||
|
||
Default base priority for user. The priority should be in the range from
|
||
0 - 31, and 4 is the default for a timesharing user.
|
||
|
||
|
||
/PRIVILEGES
|
||
|
||
/PRIVILEGES=([NO]privname[,...])
|
||
|
||
Specifies authorized privileges for this user. Privileges which are
|
||
allowed or disallowed for this user. A NO prefix removes this privalege
|
||
from the user; specifying a privilege without the NO prefix allows the
|
||
user that privilege.
|
||
|
||
There are many privileges available with varying degrees of power and
|
||
potential system impact. I will make up a list of the priviledges in a
|
||
future article, until then...set them to ALL! Heheh...
|
||
|
||
|
||
/PWDEXPIRED
|
||
|
||
/[NO]PWDEXPIRED
|
||
|
||
Password is [not] pre-expired. When a password is pre-expired, the
|
||
user is allowed to log in once, at which time he must change his
|
||
password or be locked out of the system.
|
||
|
||
|
||
/PWDLIFETIME
|
||
|
||
/PWDLIFETIME=delta-time
|
||
/PWDLIFETIME=NONE
|
||
|
||
Password lifetime. If the date of last password change is older than
|
||
the password lifetime, when the user logs in, he is issued a warning
|
||
message and the password is marked as expired. If there is no password
|
||
lifetime, the password never expires.
|
||
|
||
Delta-time is in the form: [dddd-] [hh:mm:ss.cc]
|
||
|
||
|
||
/PWDMINIMUM
|
||
|
||
/PWDMINIMUM=n
|
||
|
||
Minimum password length in characters. Note that this value is only
|
||
enforced by the SET PASSWORD command; passwords in violation of this
|
||
value may be specified to AUTHORIZE.
|
||
|
||
|
||
/QUEPRIORITY
|
||
|
||
/QUEPRIORITY=n
|
||
|
||
Maximum priority for queuing batch and print jobs. The priority should
|
||
be in the range from 0 - 31, and 4 is the default value for a
|
||
timesharing user.
|
||
|
||
|
||
/REMOTE
|
||
|
||
/[NO]REMOTE=([PRIMARY], [n-m], [n] [,...] [SECONDARY], [n-m], [n] [,...])
|
||
/[NO]REMOTE="[PRIMARY][:] [n-m][,] [n][,...][;] [SECONDARY][:] [n-m][,...]"
|
||
|
||
Specifies hours of access permitted for interactive login via network
|
||
remote terminals (i.e., SET HOST). For a detailed description of the
|
||
interpretation of the access specification, see the /ACCESS qualifier.
|
||
|
||
|
||
/SFLAGS
|
||
|
||
/SFLAGS=([NO]option[,...])
|
||
|
||
This qualifier is obsolete and is retained for compatibility purposes.
|
||
For current usage, see the /ACCESS, etc., qualifiers.
|
||
Login flags for secondary days. Options are:
|
||
|
||
[NO]DISDIALUP - [do not] prohibit user from dialing in
|
||
[NO]DISNETWORK - [do not] prohibit user from logging in via a
|
||
"SET HOST" command.
|
||
|
||
|
||
/S_RESTRICT
|
||
|
||
/S_RESTRICT=(n-m[,...])
|
||
|
||
or
|
||
|
||
/S_RESTRICT=(n[,...])
|
||
|
||
This qualifier is obsolete and is retained for compatibility purposes.
|
||
For current usage, see the /ACCESS, etc., qualifiers.
|
||
Used to specify hours or ranges of hours to restrict user from logging in on
|
||
secondary days.
|
||
|
||
/S_RESTRICT=(...) is roughly equivalent to /NOACCESS=(SECONDARY, ...)
|
||
|
||
|
||
/SHRFILLM
|
||
|
||
/SHRFILLM=n
|
||
|
||
Maximum number of shared files allowed to be open at one time.
|
||
|
||
|
||
/TQELM
|
||
|
||
/TQELM=n
|
||
|
||
Total entries in the timer queue plus the number of temporary common
|
||
event flag clusters that the user can have at one time.
|
||
|
||
|
||
/UIC
|
||
|
||
/UIC=uic
|
||
|
||
User identification code as explained in the VAX/VMS System Manager's
|
||
Reference Manual. The UIC should have an octal group number and user
|
||
number, and be separated by a comma and enclosed in brackets.
|
||
|
||
|
||
/WSDEFAULT
|
||
|
||
/WSDEFAULT=n
|
||
|
||
Initial limit of a working set for the user process.
|
||
|
||
|
||
/WSEXTENT
|
||
|
||
/WSEXTENT=n
|
||
|
||
Maximum to which the user's process may raise its working set limit
|
||
when there is free memory available.
|
||
|
||
|
||
/WSQUOTA
|
||
|
||
/WSQUOTA=n
|
||
|
||
Maximum to which the user's process may raise the working set limit
|
||
when system memory is in demand.
|
||
|
||
|
||
|
||
ADD/IDENTIFIER
|
||
--------------------
|
||
The ADD/IDENTIFIER command is used to add an identifier to the rights
|
||
database.
|
||
|
||
Format:
|
||
|
||
ADD/IDENTIFIER [id-name]
|
||
|
||
Parameters:
|
||
id-name
|
||
|
||
specifies the name of the identifier to be added to the rights
|
||
database. If you omit the name, you must specify the /USER
|
||
qualifier. The id-name is a string of 1 through 32
|
||
alphanumeric characters that may contain underscores and dollar
|
||
signs. The name must contain at least one non-numeric
|
||
character.
|
||
|
||
Qualifiers:
|
||
/ATTRIBUTES
|
||
|
||
/ATTRIBUTES=(keyword)
|
||
|
||
Specifies attributes to be associated with the new identifier.
|
||
Valid keywords are:
|
||
|
||
[NO]DYNAMIC Indicates whether or not unprivileged holders of the
|
||
identifier may add or remove the identifier from the
|
||
process rights list. The default is NODYNAMIC.
|
||
|
||
[NO]RESOURCE Indicates whether or not holders of the identifier
|
||
may charge resources to it. The default is NORESOURCE.
|
||
|
||
|
||
/USER
|
||
|
||
/USER=user-spec
|
||
|
||
Scans the UAF record(s) of the specified user(s) and creates
|
||
the appropriate identifiers(s). Specify user-spec by username
|
||
or UIC. You can user the asterisk wildcard to specify multiple
|
||
usernames or UICs: full user of the asterisk and percent
|
||
wildcards is permitted for user names; UICs must be in the form
|
||
[*,*], [n,*], [*,n], or [n,n]. A wildcard username
|
||
specification (i.e., *) creates identifiers alphabetically by
|
||
username; a wildcard UIC specification (i.e., [*,*]) creates
|
||
them in numerical order by UIC.
|
||
|
||
|
||
/VALUE
|
||
|
||
/VALUE=value-specifier
|
||
|
||
Specifies the value to be attached to the identifier. Valid formats
|
||
for the value-specifier are:
|
||
|
||
IDENTIFIER:integer An integer value in the range of
|
||
32768 to 268435455, or a
|
||
hexadecimal number in the range
|
||
%X00008000 to 0FFFFFF
|
||
|
||
UIC:uic A uic value in the standard UIC
|
||
format
|
||
|
||
Examples:
|
||
|
||
The following examples illustrate the use of the ADD/IDENTIFIER
|
||
command.
|
||
|
||
1. UAF> ADD/IDENTIFIER/VALUE=UIC:[300,011] INVENTORY
|
||
identifier INVENTORY value: [000300,000011] added to RIGHTSLIST.DAT
|
||
|
||
This command adds to the rights database an identifier named
|
||
INVENTORY. By default, the identifier is not marked as a
|
||
resource.
|
||
|
||
2. UAF> ADD/IDENTIFIER/ATTRIBUTES=(RESOURCE) -
|
||
/VALUE=IDENTIFIER:%X80011 PAYROLL
|
||
identifier PAYROLL value: %X80080011 added to RIGHTSLIST.DAT
|
||
|
||
This command adds the identifier PAYROLL and marks it as a
|
||
resource.
|
||
|
||
|
||
ADD/PROXY
|
||
Adds a user record to the network UAF.
|
||
|
||
Format
|
||
|
||
ADD/PROXY node::remote-user local-user
|
||
|
||
Parameters:
|
||
node
|
||
|
||
specifies a node name (1 through 6 alphanumberic characters).
|
||
|
||
remote-user
|
||
|
||
specifies the username of a user at a remote node. If you
|
||
specify an asterisk, all users at the specified node can access
|
||
files of a user specified on the local node.
|
||
|
||
local-user
|
||
|
||
specifies the username of a user on a local node.
|
||
|
||
Examples:
|
||
|
||
1. UAF> ADD/PROXY MISHA::MARCO *
|
||
record successfully added NETUAF.DAT
|
||
|
||
The command in this example specifies that the user MARCO on
|
||
the remote node MISHA can only access the files of MARCO on the
|
||
local node.
|
||
|
||
2. UAF> ADD/PROXY MISHA::* MARCO
|
||
record successfully added to NETUAF.DAT
|
||
|
||
The command in this example specifies that any user on the
|
||
remote node MISHA can access the files of MARCO on the local
|
||
node.
|
||
|
||
Parameters:
|
||
newusername
|
||
|
||
"newusername" specifies the name of the user to be added to the user
|
||
authorization file.
|
||
|
||
|
||
|
||
COPY
|
||
--------------------
|
||
The COPY command is used to make a copy of a record in SYSUAF.DAT. The
|
||
full range of qualifiers is available for the command in order to
|
||
change certain fields in the process of the copy operation.
|
||
|
||
Format:
|
||
|
||
COPY existing-username new-username [/qualifiers]
|
||
|
||
Parameters:
|
||
existing-username new-username
|
||
|
||
existing-username is the source authorization record;
|
||
new-username is the destination authorization record.
|
||
|
||
Qualifiers:
|
||
(Same qualifiers as ADD)
|
||
|
||
|
||
|
||
CREATE
|
||
--------------------
|
||
This command will create a Proxy Login File (NETUAF.DAT) if one does
|
||
not already exist or the rights database (RIGHTSLIST.DAT).
|
||
|
||
Qualifiers:
|
||
/PROXY
|
||
Creates and initializes a network UAF, NETUAF.DAT. The /PROXY
|
||
qualifier is required. The file is created with no records and
|
||
is assigned the following protection:
|
||
|
||
(S:RWED,O:RWED,G:RWE,W)
|
||
|
||
|
||
/RIGHTS
|
||
Creates and initializes the rights database, RIGHTSLIST.DAT,
|
||
If it does not already exist. The file is created with no
|
||
records and is assigned the following protection:
|
||
|
||
(S:RWED,0:RWED,G:RWE,W)
|
||
|
||
Format
|
||
|
||
CREATE/RIGHTS
|
||
|
||
Qualifiers: Format CREAT/(PROXY or RIGHTS)/qualifier
|
||
/SYSTEM_ID=(integer list)
|
||
Specifies the system ID quadword. Only the first two integers
|
||
are used. The first integer becomes the first longword of the
|
||
system ID, and the second integer the second longword. If only
|
||
one integer is specified, the second longword is set to 0.
|
||
|
||
DEFAULT
|
||
--------------------
|
||
This command enables the user to change any field(s) in the DEFAULT
|
||
record in SYSUAF.DAT.
|
||
|
||
Format:
|
||
|
||
DEFAULT /qualifier [/qualifiers]
|
||
|
||
Qualifiers:
|
||
(Same qualifiers as ADD)
|
||
|
||
|
||
|
||
EXIT
|
||
--------------------
|
||
The EXIT command terminates AUTHORIZE and returns the user to command
|
||
language level.
|
||
|
||
Format:
|
||
|
||
EXIT
|
||
|
||
|
||
|
||
GRANT
|
||
--------------------
|
||
The GRANT command grants an identifier name to a user UIC. The
|
||
/IDENTIFIER is required.
|
||
|
||
Format
|
||
|
||
GRANT/IDENTIFIER id-name user-spec
|
||
|
||
Parameters:
|
||
id-name
|
||
|
||
Specifies the identifier name (see the ADD/IDENTIFIER command).
|
||
|
||
user-spec
|
||
|
||
Is an identifier (UIC or non UIC format) that specifies the
|
||
user (see the ADD/IDENTIFIER command).
|
||
|
||
Qualifier:
|
||
|
||
/ATTRIBUTES
|
||
|
||
/ATTRIBUTES=(keyword)
|
||
|
||
See the ADD/IDENTIFIER command.
|
||
|
||
Example:
|
||
UAF> GRANT/IDENTIFIER INVENTORY [300,015]
|
||
identifier INVENTORY granted to CRAMER
|
||
|
||
The command in this example grants the identifier INVENTORY to
|
||
a user with the UIC [300,015]. The user becomes the holder of
|
||
the identifier and any resources associated with it.
|
||
|
||
|
||
|
||
HELP
|
||
--------------------
|
||
Lists and explains the AUTHORIZE commands and qualifiers.
|
||
|
||
Format
|
||
|
||
HELP [commmand-name]
|
||
|
||
Parameter:
|
||
command-name
|
||
|
||
Name of an AUTHORIZE command.
|
||
|
||
Qualifier:
|
||
qualifier-name
|
||
|
||
Name of an AUTHORIZE qualifier
|
||
|
||
|
||
|
||
LIST
|
||
--------------------
|
||
The LIST command outputs a listing file which gives information
|
||
on the records specified. Unless otherwise specified by
|
||
qualifiers, UAF records are listed.
|
||
|
||
Qualifiers:
|
||
/BRIEF
|
||
This qualifier will give an abbreviated listing of the desired record(s).
|
||
/BRIEF is equivalent to /NOFULL.
|
||
|
||
|
||
/FULL
|
||
This qualifier gives complete information on the desired record(s).
|
||
/FULL is equivalent to /NOBRIEF. /FULL is the default.
|
||
|
||
LIST/IDENTIFIER
|
||
--------------------
|
||
Creates a listing file (RIGHTLIST.LIS) to which identifier
|
||
information is written.
|
||
|
||
Format
|
||
|
||
LIST/IDENTIFIER [id-name]
|
||
|
||
Parameter:
|
||
id-name
|
||
|
||
Specifies an identifier name. If you omit the identifier name,
|
||
you must specify /USER or /VALUE.
|
||
|
||
Qualifiers:
|
||
/USER
|
||
/USER=user-spec
|
||
|
||
Specifies one or more users whose identifiers are to be listed.
|
||
User-spec may be a username or UIC. You can user the asterisk
|
||
wildcard to specify multiple usernames or UICs: full use of
|
||
the asterisk and percent wildcards is permitted for usernames;
|
||
UICs must be in the form [*,*], [*,n], or [n,*]. A
|
||
wildcard username specification (i.e., *) lists identifiers
|
||
alphabetically by username; a wildcard UIC specification (i.e.,
|
||
[*,*]) lists them numerically by UIC.
|
||
|
||
|
||
/VALUE
|
||
/VALUE=value-specifier
|
||
|
||
Specifies the value of the identifier to be listed. Valid
|
||
formats for the value-specifier are:
|
||
|
||
IDENTIFIER:integer An integer value in the range of
|
||
32768 to 268435455, or a
|
||
hexadecimal number in the range
|
||
%X00008000 to 0FFFFFFF
|
||
|
||
UIC:uic A uic value in the standard UIC
|
||
format
|
||
|
||
Examples:
|
||
|
||
UAF> LIST/IDENTIFIER INVENTORY
|
||
writing listing file
|
||
listing file RIGHTSLIST.LIS complete
|
||
|
||
The command in this example generates a full listing for the
|
||
identifier INVENTORY, including its value (in hexadecimal),
|
||
holders, and attributes.
|
||
|
||
UAF> LIST/IDENTIFIER/USER=ANDERSON
|
||
writing listing file
|
||
listing file SYSUAF.LIS complete
|
||
|
||
This command lists an identifier associated with the user
|
||
ANDERSON, along with its value and attributes. Note, however,
|
||
that this is the same result you would produce had you
|
||
specified ANDERSON's UIC with the following forms of the
|
||
command:
|
||
|
||
UAF> LIST/IDENTIFIER/USER=[300,015]
|
||
|
||
or
|
||
|
||
UAF> LIST/IDENTIFIER/VALUE=UIC:[300,015]
|
||
|
||
LIST/PROXY
|
||
--------------------
|
||
Creates a listing file of all the network UAF records. The
|
||
/PROXY qualifier is required.
|
||
|
||
Format
|
||
|
||
LIST/PROXY
|
||
|
||
Example:
|
||
|
||
UAF> LIST/PROXY
|
||
writing listing file
|
||
listing file NETUAF.LIS complete
|
||
|
||
The command in this example creates a listing file of all the
|
||
network UAF records.
|
||
|
||
|
||
|
||
LIST/RIGHTS
|
||
--------------------
|
||
Lists the holders of the specified identifier, or, if /USER is
|
||
specified, all identifiers held by the specified user(s).
|
||
|
||
Format
|
||
|
||
LIST/RIGHTS [id-name]
|
||
|
||
Parameter:
|
||
id-name
|
||
|
||
This is the name of the identifier (usually the username) associated
|
||
with the user. If id-name is omitted, you must specify the
|
||
/USER qualifier.
|
||
|
||
Qualifier:
|
||
/USER
|
||
/USER=user-spec
|
||
|
||
Specifies a user whose identifiers are to be listed. User-spec
|
||
may be a username or UIC. You can use the asterisk wildcard to
|
||
specify multiple usernames or UICs: full user of the asterisk
|
||
and percent wildcards is permitted for usernames; UICs must be
|
||
in the form [*,*], [n,*], [n,n] or [*,n]. A wildcard username
|
||
specification (i.e., *) or wildcard UIC specification (i.e.,
|
||
[*,*]) lists all identifiers held by users. The wildcard
|
||
username specification lists holders' usernames alphabetically;
|
||
the wildcard UIC specification lists them in the numerical
|
||
order of their UICs.
|
||
|
||
Example:
|
||
UAF> LIST/RIGHTS PAYROLL
|
||
writing listing file
|
||
listing file RIGHTSLIST.LIS is complete
|
||
|
||
The command is this example creates a listing file of all
|
||
holders of the identifier PAYROLL.
|
||
|
||
|
||
|
||
MODIFY
|
||
--------------------
|
||
This command allows the user to change any field(s) in any user authorization
|
||
record(s). Wildcarding of usernames or UICs is allowed.
|
||
|
||
Format:
|
||
|
||
MODIFY user-spec /qualifier [/qualifiers]
|
||
|
||
Qualifier's:
|
||
The MODIFY qualifiers are very similar to the ADD qualifiers with the
|
||
following exceptions:
|
||
|
||
/[NO]MODIFY_IDENTIFIER rather than /[NO]ADD_IDENTIFIER with the same
|
||
parameters
|
||
|
||
|
||
/ASTLM
|
||
/ASTLM=value
|
||
|
||
Specifies the AST queue limit, which is the total number of asynchronous
|
||
system trap operations and scheduled wakeup requests that can be
|
||
outstanding at one time for the user.
|
||
|
||
|
||
|
||
MODIFY/IDENTIFIER
|
||
--------------------
|
||
Modifies an identifier in the rights database.
|
||
|
||
Format
|
||
|
||
MODIFY/IDENTIFIER id-name
|
||
|
||
Parameter:
|
||
id-name
|
||
|
||
Specifies the name of an identifier to be modified
|
||
|
||
Qualifiers:
|
||
/ATTRIBUTES
|
||
|
||
/ATTRIBUTES=(keyword)
|
||
|
||
Specifies attributes to be associated with the modified
|
||
identifier. Valid keywords are:
|
||
|
||
[NO]DYNAMIC Indicates whether or not unprivileged holders of the
|
||
identifier may add or remove the identifier from the
|
||
process rights list. The default is NODYNAMIC.
|
||
|
||
[NO]RESOURCE Indicates whether or not holders of the identifier
|
||
may charge resources to it. The default is NORESOURCE.
|
||
|
||
If you specify RESOURCE, a holder named with the /HOLDER
|
||
qualifier gains the right to charge resources to the
|
||
identifier. If you specify /NORESOURCE, the holder loses the
|
||
right to charge resources. If you specify NORESOURCE and do
|
||
not name any holder (if /HOLDER is not specified), all holders
|
||
lose the right to charge resources.
|
||
|
||
|
||
/HOLDER
|
||
|
||
/HOLDER=username
|
||
|
||
Specifies the holder of an identifier whose attributes are to
|
||
modified. /HOLDER is used only in conjunction with
|
||
/ATTRIBUTES qualifier. If you specify /HOLDER, the /NAME and
|
||
/VALUE qualifiers are ignored.
|
||
|
||
|
||
/NAME
|
||
|
||
/NAME=id-name
|
||
|
||
Specifies a new id-name to be associated with the identifier.
|
||
|
||
|
||
/VALUE
|
||
|
||
/VALUE=value-specifier
|
||
|
||
Specifies a new identifier value. Note, however, that an
|
||
identifier value cannot be modified from a UIC to a non UIC
|
||
format or vice versa. Valid formats for the value-specifier
|
||
are:
|
||
|
||
IDENTIFIER:integer An integer value in the range of
|
||
32768 to 268435455, or a
|
||
hexadecimal number in the range
|
||
%X00008000 to 0FFFFFFF
|
||
|
||
UIC:uic A uic value in the standard UIC
|
||
format
|
||
|
||
Examples:
|
||
UAF> MODIFY/IDENTIFIER/VALUE=UIC:[300,21] ACCOUNTING
|
||
identifier ACCOUNTING modified
|
||
|
||
The command in this example changes the old UIC value of the
|
||
identifier ACCOUNTING to a new value.
|
||
|
||
UAF> MODIFY/IDENTIFIER/ATTRIBUTES=NORESOURCE/HOLDER=ALLISON ACCOUNTING
|
||
identifier ACCOUNTING modified
|
||
|
||
The command in this example associates the attribute NORESOURCE
|
||
with the identifier ACCOUNTING in ALLISON's holder record.
|
||
|
||
|
||
|
||
MODIFY/SYSTEM_PASSWORD
|
||
Sets the system password.
|
||
|
||
Format
|
||
|
||
MODIFY/SYSTEM_PASSWORD=system-password
|
||
|
||
Parameters:
|
||
user-spec
|
||
|
||
The record(s) to be modified may be specified in a variety of ways:
|
||
|
||
1) wildcarded username (standard DCL wildcarding)
|
||
2) wildcarded UIC, as
|
||
a) [*,*]
|
||
b) [*,n]
|
||
c) [n,*]
|
||
3) specific username
|
||
4) specific UIC
|
||
|
||
|
||
|
||
REMOVE
|
||
--------------------
|
||
This command will remove a user authorization record from SYSUAF.DAT.
|
||
|
||
Format for removing a record from SYSUAF.DAT:
|
||
|
||
REMOVE username
|
||
|
||
Parameters:
|
||
username
|
||
|
||
username is the name of the authorization record to be removed from
|
||
SYSUAF.DAT.
|
||
|
||
Qualifiers:
|
||
/REMOVE_IDENTIFIER
|
||
|
||
/[NO]REMOVE_IDENTIFIER
|
||
|
||
Controls whether the identifier corresponding to the specified username
|
||
in the rights database is removed. The default is /REMOVE_IDENTIFIER.
|
||
|
||
|
||
|
||
REMOVE/IDENTIFIER
|
||
--------------------
|
||
Removes an identifier from the rights database.
|
||
|
||
Format
|
||
|
||
REMOVE/IDENTIFIER id-name
|
||
|
||
Parameter:
|
||
id-name
|
||
|
||
Specifies the name of an identifier in the rights database.
|
||
|
||
Example:
|
||
UAF> REMOVE/IDENTIFIER Q1SALES
|
||
record removed from RIGHTSLIST.DAT
|
||
|
||
The command in this example deletes the identifier Q1SALES from
|
||
the rights database.
|
||
|
||
|
||
|
||
REMOVE/PROXY
|
||
--------------------
|
||
This qualifier changes the context of REMOVE command. Its presence
|
||
indicates that the intention is to remove a record from the Proxy
|
||
Login File, NETUAF.DAT. The format for removing a record from
|
||
NETUAF.DAT is
|
||
|
||
REMOVE/PROXY node::remoteusername
|
||
|
||
where "node::remoteusername" is an entry in NETUAF.DAT for the local node.
|
||
|
||
|
||
RENAME
|
||
This command will change the username for a record in the user authorization
|
||
file, SYSUAF.DAT. The only parameter qualifier allowed for the RENAME
|
||
command is the /PASSWORD qualifier.
|
||
|
||
|
||
Format:
|
||
|
||
RENAME old-username new-username [/PASSWORD=password]
|
||
|
||
Qualifiers:
|
||
/GENERATE
|
||
|
||
/GENERATE
|
||
/GENERATE=CURRENT
|
||
/GENERATE=PRIMARY
|
||
/GENERATE=SECONDARY
|
||
/GENERATE=BOTH
|
||
/GENERATE=ALL
|
||
|
||
Generate a random password. The formats of the passwords is the same
|
||
as for the DCL SET PASSWORD /GENERATE command.
|
||
|
||
/MODIFY_IDENTIFIER
|
||
|
||
/[NO]MODIFY_IDENTIFIER
|
||
|
||
Controls whether the identifier corresponding to the specified username
|
||
in the rights database is modified. The default is /MODIFY_IDENTIFIER.
|
||
|
||
/PASSWORD
|
||
|
||
/PASSWORD=(password [,password2])
|
||
/NOPASSWORD
|
||
|
||
Password(s) for login. Must be from 0 to 31 characters in length, and
|
||
must be composed of alphanumeric characters, dollar signs, and underscores.
|
||
|
||
To set the first password with no second password, specify
|
||
|
||
/PASSWORD=password
|
||
|
||
To set both passwords, specify
|
||
|
||
/PASSWORD=(password, password2)
|
||
|
||
To set only the first password leaving the second alone, specify
|
||
|
||
/PASSWORD=(password, "")
|
||
|
||
To set only the second password leaving the first alone, specify
|
||
|
||
/PASSWORD=("", password2)
|
||
|
||
To clear the second password leaving the first alone, specify
|
||
|
||
/PASSWORD=""
|
||
|
||
To clear both passwords, specify
|
||
|
||
/NOPASSWORD
|
||
|
||
It is important to specify new passwords for a renamed record. Since
|
||
the user name is taken as part of the input for password verification,
|
||
the old password with the new user name will not yield the same result
|
||
as the original password and user name, and the verification will fail.
|
||
|
||
|
||
|
||
RENAME/IDENTIFIER
|
||
--------------------
|
||
Renames an identifier in the rights database.
|
||
|
||
Format
|
||
|
||
RENAME/IDENTIFIER old-id-name new-id-name
|
||
|
||
Parameters:
|
||
old-id-name
|
||
|
||
Specifies the name of an identifier to be renamed.
|
||
|
||
new-id-name
|
||
|
||
Specifies the new identifier name.
|
||
|
||
Example:
|
||
|
||
UAF> RENAME/IDENTIFIER Q1SALES Q2SALES
|
||
identifier Q1SALES renamed
|
||
|
||
The command in this example renames the identifier Q1SALES to
|
||
Q2SALES.
|
||
|
||
|
||
Parameters
|
||
old-username new-username
|
||
|
||
"old-username" is the username for the authorization record which is to
|
||
be renamed. "new-username" is the new username for the record.
|
||
|
||
|
||
|
||
REVOKE
|
||
--------------------
|
||
Revokes an identifier name from a username or UIC identifier.
|
||
The /IDENTIFIER qualifier is required.
|
||
|
||
Format
|
||
|
||
REVOKE/IDENTIFIER id-name user-spec
|
||
|
||
Parameters:
|
||
id-name
|
||
|
||
Specifies the identifier name (see the ADD/IDENTIFIER command).
|
||
|
||
user-spec
|
||
|
||
Is an identifier (UIC or non UIC format) that specifies the
|
||
user (see the ADD/IDENTIFIER command).
|
||
|
||
|
||
|
||
SHOW
|
||
--------------------
|
||
The SHOW command outputs a listing of the specified
|
||
authorization record(s) to the user's terminal. Unless otherwise
|
||
specified by qualifiers, UAF records are listed.
|
||
|
||
Format for the authorization file:
|
||
|
||
SHOW [/qualifiers] user-spec
|
||
|
||
Qualifiers:
|
||
/BRIEF
|
||
This qualifier will give an abbreviated listing of the desired record(s).
|
||
/BRIEF is equivalent to /NOFULL. /BRIEF is the default.
|
||
|
||
/FULL
|
||
This qualifier gives complete information on the desired record(s).
|
||
/FULL is equivalent to /NOBRIEF.
|
||
|
||
|
||
|
||
SHOW/IDENTIFIER
|
||
--------------------
|
||
Displays information about the identifier on the current
|
||
SYS$OUTPUT device.
|
||
|
||
Format
|
||
|
||
SHOW/IDENTIFIER [id-name]
|
||
|
||
Parameter:
|
||
id-name
|
||
|
||
Specifies an identifier name. If you omit the identifier name,
|
||
you must specify /USER or /VALUE.
|
||
|
||
Qualifiers:
|
||
/BRIEF
|
||
This qualifier will give an abbreviated listing of the desired record(s).
|
||
/BRIEF is equivalent to /NOFULL. /BRIEF is the default.
|
||
|
||
|
||
/FULL
|
||
This qualifier gives complete information on the desired record(s).
|
||
/FULL is equivalent to /NOBRIEF.
|
||
/USER
|
||
|
||
|
||
/USER=user-spec
|
||
|
||
Specifies one or more users whose identifiers are to be
|
||
displayed. User-spec may be XH].+++lKU%9@You can use
|
||
the asterisk wildcard to specify multiple usernames or UICs:
|
||
full use of the asterisk and percent wildcards is permitted for
|
||
usernames; UICs must be in the form [*,*], [*,n], [n,*], or
|
||
[n,n]. A wildcard username specification (i.e., *) displays
|
||
identifiers alphabetically by username; a wildcard UIC
|
||
specification (i.e., [*,*]) displays them numerically by UIC.
|
||
|
||
|
||
/VALUE
|
||
/VALUE=value-specifier
|
||
|
||
Specifies the value of the identifier to be listed. Valid
|
||
formats for the value-specifier are:
|
||
|
||
IDENTIFIER:integer An integer value in the range of
|
||
32768 to 268435455, or a
|
||
hexadecimal number in the range
|
||
%X00008000 to 0FFFFFFF
|
||
|
||
UIC:uic A uic value in the standard UIC
|
||
format
|
||
|
||
SHOW/PROXY
|
||
Displays one or all records in the network UAF. The /PROXY
|
||
qualifier is required.
|
||
|
||
Format
|
||
|
||
SHOW/PROXY node::remote-user
|
||
|
||
Parameters:
|
||
node
|
||
|
||
Specifies the name of a network node in the network UAF. The
|
||
asterisk wildcard is permitted in the node specification.
|
||
|
||
remote-user
|
||
|
||
Specifies the name of a user on a remote node. The asterisk
|
||
wildcard is permitted in the remote-user specification.
|
||
|
||
SHOW/RIGHTS
|
||
Displays the names, values, and attributes of all identifiers
|
||
held by the specified user(s).
|
||
|
||
Format
|
||
|
||
SHOW/RIGHTS [user-spec]
|
||
|
||
Parameter:
|
||
user-spec
|
||
|
||
Is the name of the identifier (usually the username) associated
|
||
with the user in SYSUAF.DAT. If user-spec is omitted, you must
|
||
specify the /USER qualifier.
|
||
|
||
Qualifier:
|
||
/USER
|
||
|
||
/USER=user-spec
|
||
|
||
Specifies one or more users whose identifiers are to be
|
||
displayed. User-spec may be a username or UIC. You can use
|
||
the asterisk wildcard to specify multiple usernames or UICs:
|
||
full use of the asterisk and percent wildcards is permitted for
|
||
usernames; UICs must be in the form [*,*], [*,n], [n,*], or
|
||
[n,n]. A wildcard username specification (i.e., *) displays
|
||
identifiers alphabetically by username; a wildcard UIC
|
||
specification (i.e., [*,*]) displays them numerically by UIC.
|
||
|
||
|
||
Parameters:
|
||
|
||
If a listing is generated from SYSUAF.DAT, then the user may specify
|
||
"user-spec" in a variety of ways:
|
||
|
||
1) wildcarded username (standard DCL wildcarding)
|
||
|
||
2) wildcarded UIC, as
|
||
a) [*,*]
|
||
b) [*,n]
|
||
c) [n,*]
|
||
3) specific username
|
||
4) specific UIC.
|
||
|
||
|
||
Phew! After all that, you should be doing just fine using the Authorize
|
||
Utility. You can expect summaries of VMS commands, DCL, and other VAX infor-
|
||
mation in future articles. Now, happy hacking and go play God for a while!
|
||
|
||
______________________________________________________________________________
|
||
$ |