HP (Hewlett-Packard) Sentry manual
- Consulta online o descarga el manual de instrucciones
- 113 páginas
- 0.39 mb
Ir a la página of
manuales de instrucciones parecidos
-
Printer
HP (Hewlett-Packard) D1600
60 páginas 8.39 mb -
Printer
HP (Hewlett-Packard) E0495
98 páginas 0.34 mb -
Printer
HP (Hewlett-Packard) 1012
4 páginas 0.29 mb -
Printer
HP (Hewlett-Packard) 2300n
196 páginas 4.68 mb -
Printer
HP (Hewlett-Packard) IU 690
36 páginas 1.56 mb -
Printer
HP (Hewlett-Packard) 5700
90 páginas 1.05 mb -
Printer
HP (Hewlett-Packard) B4400
16 páginas 0.17 mb -
Printer
HP (Hewlett-Packard) P2035n
4 páginas 0.14 mb
Buen manual de instrucciones
Las leyes obligan al vendedor a entregarle al comprador, junto con el producto, el manual de instrucciones HP (Hewlett-Packard) Sentry. La falta del manual o facilitar información incorrecta al consumidor constituyen una base de reclamación por no estar de acuerdo el producto con el contrato. Según la ley, está permitido adjuntar un manual de otra forma que no sea en papel, lo cual últimamente es bastante común y los fabricantes nos facilitan un manual gráfico, su versión electrónica HP (Hewlett-Packard) Sentry o vídeos de instrucciones para usuarios. La condición es que tenga una forma legible y entendible.
¿Qué es un manual de instrucciones?
El nombre proviene de la palabra latina “instructio”, es decir, ordenar. Por lo tanto, en un manual HP (Hewlett-Packard) Sentry se puede encontrar la descripción de las etapas de actuación. El propósito de un manual es enseñar, facilitar el encendido o el uso de un dispositivo o la realización de acciones concretas. Un manual de instrucciones también es una fuente de información acerca de un objeto o un servicio, es una pista.
Desafortunadamente pocos usuarios destinan su tiempo a leer manuales HP (Hewlett-Packard) Sentry, sin embargo, un buen manual nos permite, no solo conocer una cantidad de funcionalidades adicionales del dispositivo comprado, sino también evitar la mayoría de fallos.
Entonces, ¿qué debe contener el manual de instrucciones perfecto?
Sobre todo, un manual de instrucciones HP (Hewlett-Packard) Sentry debe contener:
- información acerca de las especificaciones técnicas del dispositivo HP (Hewlett-Packard) Sentry
- nombre de fabricante y año de fabricación del dispositivo HP (Hewlett-Packard) Sentry
- condiciones de uso, configuración y mantenimiento del dispositivo HP (Hewlett-Packard) Sentry
- marcas de seguridad y certificados que confirmen su concordancia con determinadas normativas
¿Por qué no leemos los manuales de instrucciones?
Normalmente es por la falta de tiempo y seguridad acerca de las funcionalidades determinadas de los dispositivos comprados. Desafortunadamente la conexión y el encendido de HP (Hewlett-Packard) Sentry no es suficiente. El manual de instrucciones siempre contiene una serie de indicaciones acerca de determinadas funcionalidades, normas de seguridad, consejos de mantenimiento (incluso qué productos usar), fallos eventuales de HP (Hewlett-Packard) Sentry y maneras de solucionar los problemas que puedan ocurrir durante su uso. Al final, en un manual se pueden encontrar los detalles de servicio técnico HP (Hewlett-Packard) en caso de que las soluciones propuestas no hayan funcionado. Actualmente gozan de éxito manuales de instrucciones en forma de animaciones interesantes o vídeo manuales que llegan al usuario mucho mejor que en forma de un folleto. Este tipo de manual ayuda a que el usuario vea el vídeo entero sin saltarse las especificaciones y las descripciones técnicas complicadas de HP (Hewlett-Packard) Sentry, como se suele hacer teniendo una versión en papel.
¿Por qué vale la pena leer los manuales de instrucciones?
Sobre todo es en ellos donde encontraremos las respuestas acerca de la construcción, las posibilidades del dispositivo HP (Hewlett-Packard) Sentry, el uso de determinados accesorios y una serie de informaciones que permiten aprovechar completamente sus funciones y comodidades.
Tras una compra exitosa de un equipo o un dispositivo, vale la pena dedicar un momento para familiarizarse con cada parte del manual HP (Hewlett-Packard) Sentry. Actualmente se preparan y traducen con dedicación, para que no solo sean comprensibles para los usuarios, sino que también cumplan su función básica de información y ayuda.
Índice de manuales de instrucciones
-
Página 1
SENTRY The Integrated Security System Release 4 User Guide Fitzgerald & Long 12341 E. Cornell Avenue, #18 Aurora, Colorado 80014 - 3323 USA Phone: (303) 755 - 1102 FAX: (303) 755 - 1703[...]
-
Página 2
NOTICE The information contained in this guide is s ubject to change without notice. Fitzgerald & Long, Inc. shall not be liable for technical or editorial omissions made herein; nor for incidental or consequential damages resulting from the furnishing, performance, or use of this material. This guide con tains information protected by copyrigh[...]
-
Página 3
Table Of Contents USING THIS GUIDE ---------------------------------------------------------------------------------------- Intro - 1 USING THE SCREENS ------------------------------------------------------------------------------------ Intro - 3 INSTALLING SENTRY ------------------------------------------------------------------------------------ [...]
-
Página 4
[...]
-
Página 5
SENTRY User ’ s Guide Introduction - 1 Fitzgerald & Long USING THIS GUIDE The SENTRY User's Guide is comprehensive in its descriptions of all of SENTRY's menus, data entry screens and reports. The Guide follows the same structure as the SENTRY menu system. There are four major sections in SENTRY. These are: 1. Database Creation and [...]
-
Página 6
Introduction - 2 SENTRY User ’ s Guide Fitzgerald & Long PI/open the command prompt is indicated by a colon “ : ” while for uniVerse the prompt is a greater - than sign “ > ” .[...]
-
Página 7
SENTRY User ’ s Guide Introduction - 3 Fitzgerald & Long USING THE SCREENS SENTRY data entry screens feature some very helpful functions. These include "repaint", "backup", "escape" (exit without update), “execute ” and "help". The following parag raphs describe each function. Repaint ^^ <RETURN&[...]
-
Página 8
Introduction - 4 SENTRY User ’ s Guide Fitzgerald & Long Data Entry Conventions Underscore/underline When awaiting data, the cursor is positioned at t he beginning of the field. The field is delineated by underscores. A sentence describing the field is displayed at the bottom of the screen. No data appearing on the underscore is an indication[...]
-
Página 9
SENTRY User ’ s Guide Introduction - 5 Fitzgerald & Long INSTALLING SENTRY Installing the SENTRY software is very simple! Just follow these easy steps. If you encounter problems at any point, please call us for addi tional assistance. Before you begin, check your system to see if there is a possible conflict with the accounts we will be loadi[...]
-
Página 10
Introduction - 6 SENTRY User ’ s Guide Fitzgerald & Long 6. Notice a file named "install". This is a script which will perform the steps necessary to install the SENTRY software. Execute the script by entering: ./install 7. Next type the command to enter your database environment (uv, udt, piopen). You should now see the TCL prompt [...]
-
Página 11
SENTRY User ’ s Guide Introduction - 7 Fitzgerald & Long SENTRY Main Menu 07 AUG 2000 1. Database Creation and Validation Menu 2. Database Maintenance Menu 3. Reports Menu 4. Utilities Menu Please select one of the above: Figure 1 - Main Menu 11. At this point you are ready to begin loading your data into the SENTRY database. This procedure i[...]
-
Página 12
Introduction - 8 SENTRY User ’ s Guide Fitzgerald & Long GETTING STARTED This section describes how to invoke the SENTRY Main Menu. It also describes the copyright and the validation screen which will be displayed as you enter SENTRY. Additionally, the first three steps for loading the SENTRY database are presented. < < S E N T R Y - Se[...]
-
Página 13
SENTRY User ’ s Guide Introduction - 9 Fitzgerald & Long Our recommendation is that you create a userid called sentry with the UID of 0 (zero). This user will have “ sentry ” as its “home” directory and will invoke the database on login. Suggestion: use SENTRY to create this user while “get ting started ” with SENTRY. At TCL, ente[...]
-
Página 14
Introduction - 10 SENTRY User ’ s Guide Fitzgerald & Long This is a safety precaution. SENTRY is a very powerful tool and should only be used by the System Administrator or his designee. SENTRY is designed to be a single user utility. Therefore, only one user at a time is allowed into SENTRY. The third SENTRY screen (Figure 3) informs you tha[...]
-
Página 15
SENTRY User ’ s Guide Introduction - 11 Fitzgerald & Long wish to send the report to a specific printer, form or destination use the SETPTR command to set your printer parameters before executing this selection. After performi ng these steps your SENTRY database reflects the actual state of your system. You may now use the Database Maintenanc[...]
-
Página 16
Introduction - 12 SENTRY User ’ s Guide Fitzgerald & Long INTRODUCING THE MAIN MENU SENTRY'S Main Menu follows the copyright screen and the System Administrator validation screen. It is the entry point into the four submenu s. The four submenus are presented as selections 1 through 4 (Figure 4). SENTRY Main Menu 07 AUG 2000 1. Database C[...]
-
Página 17
SENTRY User ’ s Guide Introduction - 13 Fitzgerald & Long The first selection, Database Creation and Validation Menu offers access to programs which upload the information in the UNIX passwd and group files into SENTRY's database. Another program transverses the disks, reading the permissions, owner and group for each file and directory [...]
-
Página 18
[...]
-
Página 19
SENTRY User ’ s Guide Section 1 - 1 Fitzgerald & Long 1. INTRODUCING THE DATABASE CREATION AND VALIDATION MENU The first selection of SENTRY's Main Menu is Database Creation and Validation. This menu provides access to programs which will build SENTRY ’ s database from your existing user, group and file system data. SENTRY Main Menu 07[...]
-
Página 20
Section 1 - 2 SENTRY User ’ s Guide Fitzgerald & Long 1.0 DATABASE CREATION AND VALUDATION MENU This is the first submenu accessible from SENTRY's Ma in Menu. It is also the first selection you will make after installing SENTRY. Through this menu, you will execute programs which load all the UNIX passwd and group information on your syst[...]
-
Página 21
SENTRY User ’ s Guide Section 1 - 3 Fitzgerald & Long[...]
-
Página 22
Section 1 - 4 SENTRY User ’ s Guide Fitzgerald & Long 1.1 UPLOAD USER AND GROUP PROFILES FROM UNIX This program loads the data from the UNIX passwd and group files into the SENTRY database. Existing data in the SENTRY database is che cked and compared to that in these two files. The SENTRY database is updated to reflect the same configuration[...]
-
Página 23
SENTRY User ’ s Guide Section 1 - 5 Fitzgerald & Long We recommend: Upload the passwd and group files into the SENTRY databases on a regular basis to INSURE that SENT RY reflects an accurate view of your system. Because of the numerous file system changes which occur daily in the normal course of operations, we recommend that you execute the [...]
-
Página 24
Section 1 - 6 SENTRY User ’ s Guide Fitzgerald & Long 1.2 CR EATE DATABASE FROM FILE SYSTEM This section describes the program which create the B - trees to index your file system directories, files, file owners and groups. On a system with a very large number of files, this process may take a number of hours. This is a “ read only ” proc[...]
-
Página 25
SENTRY User ’ s Guide Section 1 - 7 Fitzgerald & Long 1.3 VALIDATE THE USER PROFILE DATABASE This p rogram is used to check the consistency of the users, groups and permissions which have been loaded into the SENTRY database via the first two programs described in this section. user IDs, groups, and their usage in the file system are analyzed[...]
-
Página 26
Section 1 - 8 SENTRY User ’ s Guide Fitzgerald & Long This program will generate a printed report, using whatever printer setup is in effect at the t ime the program is run. To modify the printer, destination or form, use the SETPTR command at the TCL prior to running the program. Alternatively, the SENTRY XEQ function may be used to execute [...]
-
Página 27
SENTRY User ’ s Guide Section 1 - 9 Fitzgerald & Long 3 . “Password for User XXXXX is less than N characters.” - The user “XXXXX ” ha s a password which is shorter than the minimum password length specified in the SENTRY System Profile screen, which is N . This user ’ s password should be updated to conform to the minimum length res[...]
-
Página 28
Section 1 - 10 SENTRY User ’ s Guide Fitzgerald & Long 5. “Group (GID) XXXXX on /ZZZZZ does not exist.” - The group number “XXXXX ” is the r egistered group for a disk object whose path is “ /ZZZZZ ” . However, the group does not exist in SENTRY. Possibly, the group once existed but has been deleted. The group for this disk object[...]
-
Página 29
SENTRY User ’ s Guide Section 1 - 11 Fitzgerald & Long[...]
-
Página 30
[...]
-
Página 31
SENTRY User ’ s Guide Section 2 - 1 Fitzgerald & Long 2. INTRODUCING THE DATABASE MAINTENANCE MENU The second selection on SENTRY's Main Menu is 2. Da tabase Maintenance Menu . Through this selection you may access data entry screens to create, delete and modify the system profile, user profiles, groups, permissions, file ownership and P[...]
-
Página 32
Section 2 - 2 SENTRY User ’ s Guide Fitzgerald & Long 2.0 DATABASE MAINTENANCE This is the second sub - menu access ible from SENTRY ’ s Main Menu. It is the menu you will use to make changes to the SENTRY database. You may create or modify users, groups and permissions through this menu. SENTRY Maintenance Menu 07 AUG 2000 1. System Profil[...]
-
Página 33
SENTRY User ’ s Guide Section 2 - 3 Fitzgerald & Long 4. File System. This entry allows you to scroll through your UNIX tree stru cture much like you do in Window ’ s File Manager. From this selection you may request “ file detail ” information which is read from the UNIX I - node. Included in this information is the last time the file [...]
-
Página 34
Section 2 - 4 SENTRY User ’ s Guide Fitzgerald & Long 2.1 SYSTEM PROFILE MAINTENANCE This data entry program is used to display and change the system profile parameters. A number of these parameters are system specific and must be set to reflect YOUR system ’ s limits. These parameters include maximums and minimums for password length, user[...]
-
Página 35
SENTRY User ’ s Guide Section 2 - 5 Fitzgerald & Long 1. Null Passwords Allowed - The default of this field is “ N ” . When set to “ N ” o, each user must have a password. If this field is set t o “ Y ” es, you may create a user with a null password. For good security, passwords should be mandatory. This field controls the data en[...]
-
Página 36
Section 2 - 6 SENTRY User ’ s Guide Fitzgerald & Long • Each password must contain at least two alphabetic characters and at least one numeric or special character. • Each password must differ from the user name and from any reverse or circular shift of that nam e. However, the System Administrator, (UID is zero) may create or change any [...]
-
Página 37
SENTRY User ’ s Guide Section 2 - 7 Fitzgerald & Long However, we recommend using UIDs smaller than 5 digits simply to make them easier to read. The d efault and recommended value for this field is 1000. 13. Maximum GID Number - This field defines the largest number which may be used as a GID. This maximum is a UNIX parameter. On some UNIX sy[...]
-
Página 38
Section 2 - 8 SENTRY User ’ s Guide Fitzgerald & Long Note that the indexing occurs at the time that the “ Create Database from File System ” program is run from the Database Creation and Validation Menu. If the punctuation characters used are changed, the program must be rerun to put the new indexing into effect. Enter field number to mo[...]
-
Página 39
SENTRY User ’ s Guide Section 2 - 9 Fitzgerald & Long 1. Minimum password change (days): Enter the number of days before a user is allowed to change his existing password. For example, if UNIX has just expired a users password and the user enters a new one, you can use this parameter to prevent the user from resetting his password to the old [...]
-
Página 40
Section 2 - 10 SENTRY User ’ s Guide Fitzgerald & Long 2.2 USER MAINTENANCE This data entry program is used to display, change, and delete user IDs, including documentation for the user, UID, GID, home directory, and initial startup command. Additionally, all supplementary groups are displayed in this screen. Supplementary groups may be added[...]
-
Página 41
SENTRY User ’ s Guide Section 2 - 11 Fitzgerald & Long SENTRY database using the user ’ s name, enter “ @ ” followed by the first or last name of the user. For example, if you wanted to search for user IDs for Peggy Long, you could enter “ @long ” . If there were more than one “long ” or if Peggy had more than one ID, a list wou[...]
-
Página 42
Section 2 - 12 SENTRY User ’ s Guide Fitzgerald & Long configured (through the System Profile screen) to generate alphanumeric passwords, which will contain at least 1 numeric character. If the System Profile is set to allow null passwords to be optional, you may <RETURN> past this prompt leaving it null. We do not recommend null passwo[...]
-
Página 43
SENTRY User ’ s Guide Section 2 - 13 Fitzgerald & Long 8. Command - This field normally defines the startup UNIX shell the user invokes. The System Profile provides a “default ” . If you wish to use the default yo u need only press <RETURN>. Otherwise, enter the path to the UNIX shell you wish this user to invoke at startup. 9. Grou[...]
-
Página 44
Section 2 - 14 SENTRY User ’ s Guide Fitzgerald & Long new password for 90 days before he was forced by UNIX to enter a new password. This is 90 calendar days. 3. Password change warning (days): Enter the number of days before a new password is required that you would like UNIX to warn the user that his passwo rd is about to expire. We recomm[...]
-
Página 45
SENTRY User ’ s Guide Section 2 - 15 Fitzgerald & Long To exit you must sav e your changes by entering “ F ” . If you make no changes or wish to cancel your session without saving changes, enter “ <ESC> “ . The User Maintenance screen will be redisplayed sans data. To delete a user enter “ DEL ” at this prompt. You will be p[...]
-
Página 46
Section 2 - 16 SENTRY User ’ s Guide Fitzgerald & Long /jaf Enter "<ESC>" to quit : Figure 17 - This is an example of the list of files owned by the user being deleted - Selection A. B) Continue to delete the user / leave files as they are. This option deletes the user from the passwd and group files but leaves the UID as the [...]
-
Página 47
SENTRY User ’ s Guide Section 2 - 17 Fitzgerald & Long D) Do not delete this user. This option allows the user to return to the main User Maintenance menu without altering the user ID or the file system. No changes are made. To select this option enter “ D ” . You will be returned to the User Maintenance screen. In summary, the User Maint[...]
-
Página 48
Section 2 - 18 SENTRY User ’ s Guide Fitzgerald & Long 2.3 GROUP MAINTENANCE Through this data entry program you may add and delete groups from the system, add a descriptive text field to document a group a nd assign the group ’ s GID. GROUP.MAINT Group Maintenance 08/07/00 Group : adm 1. Description : HP system group 2. GID : 4 Enter field[...]
-
Página 49
SENTRY User ’ s Guide Section 2 - 19 Fitzgerald & Long 2. GID - This is the number assigned to this group name. You may use “ @ ” for a list of all groups and their associated GID ’ s. You may assign a number or enter “ N ” and SENTRY will assign the next available number. Enter field number, “F”ile, “DIS”play users, “DEL?[...]
-
Página 50
Section 2 - 20 SENTRY User ’ s Guide Fitzgerald & Long In UNIX every file has an owner and a group. The references to owners and groups are the UID and the GID for each. The actual names are NOT stored, only the number. The numbers are transl ated by various UNIX utilities through a “lookup ” process in the passwd and group files. If a gr[...]
-
Página 51
SENTRY User ’ s Guide Section 2 - 21 Fitzgerald & Long GROUP.MAI NT Group Maintenance 08/14/00 Files owned by group 140 (devel) /jaf Enter "<ESC>" to quit : Figure 23 - This is an example of the list of files owned by the group “ devel ” . Selection A displays this list. B) Continue to delete the group/leave files as they [...]
-
Página 52
Section 2 - 22 SENTRY User ’ s Guide Fitzgerald & Long D) Do not delete this group. This option allows the user to return to the main Group Maintenance menu without altering the group or the file system. No changes are made. To select this option enter “ D ” . You will be returned to the Group Maintenance screen.[...]
-
Página 53
SENTRY User ’ s Guide Section 2 - 23 Fitzgerald & Long 2.4 FILE SYSTEM With this program you may change owners, groups and the permissions for any file or directory in your file system. With Sentry ’ s extensive B - tree system of cross references, you may use this program to locate the path to any object on your system. FILE .MANAGER Gener[...]
-
Página 54
Section 2 - 24 SENTRY User ’ s Guide Fitzgerald & Long FILE.MANAGER General File Utility 16:24:02 07 AUG 2000 CURSOR.MAIN ========================================================================= HELP for "Cursor Control and Commands" There are twenty comma nds which may be entered at any position on the screen. None of the commands[...]
-
Página 55
SENTRY User ’ s Guide Section 2 - 25 Fitzgerald & Long One of the most valuable functions of this program is the ability to find files and directories without knowing the full path or the full name in some cases. To use the cross reference enter “ @ ” . You will be prompted: Enter name for cross reference: In our following example, we use[...]
-
Página 56
Section 2 - 26 SENTRY User ’ s Guide Fitzgerald & Long FILE.MAINT Detailed File View 08/08/00 File Pathname : /.elm/last_read_mail File Type : normal file Inode : 11470 No of Links : 1 Size (Bytes) : 1129 Last Access : Wed Feb 1 10:11:35 2000 Last Modify : Wed Feb 1 10:11:35 2000 Last Change : Sat Aug 6 00:01:27 2000 1. Owner : 0 (peggy,root)[...]
-
Página 57
SENTRY User ’ s Guide Section 2 - 27 Fitzgerald & Long In the lower half of the screen the file owner, group and permissions are displayed. You may use this screen to modify a ny of these three fields. 1. Owner - SENTRY displays the UID of the file owner plus the user ID (may be more than one) for the displayed UID. To change the owner, enter[...]
-
Página 58
Section 2 - 28 SENTRY User ’ s Guide Fitzgerald & Long ACLs Maintenance Access Control Lists (ACLs) are an extension the standard UNIX file permissions. If you have attempted to provide database protection through the use of UNIX file permissions you will have experienced the limitation that each file may have only one owner and one owning gr[...]
-
Página 59
SENTRY User ’ s Guide Section 2 - 29 Fitzgerald & Long This is an example of the “ACL Maintenance Screen ” . Not all UNIX systems support ACLs. Additionally, you may elect not to use them. If your copy of SENTRY displays this screen you may create and change ACLs with this program. When this screen is displayed, the pathname of the select[...]
-
Página 60
Section 2 - 30 SENTRY User ’ s Guide Fitzgerald & Long[...]
-
Página 61
SENTRY User ’ s Guide Section 2 - 31 Fitzgerald & Long The next field “ 3. Permissions ” consists of three sets of three permissions. In our example they are “ rwx rwx --- ” . The first three, left most c haracters are the rights assigned to the Owner. The second set of characters are rights assigned to the Owning Group and the third [...]
-
Página 62
Section 2 - 32 SENTRY User ’ s Guide Fitzgerald & Long the user is not the owner and not a member of the group associated with a file, the permissions displayed for the user will be that of “other ” . The benefit of this feature is that you may browse through your file system, viewing access rights without having to know if a user is in a[...]
-
Página 63
SENTRY User ’ s Guide Section 2 - 33 Fitzgerald & Long FILE.MANAGER General File Ut ility 14:39:56 18 AUG 2000 Path : / (32 entries.) Access shown for group piadm (9) top... -- > drwx------ root mail --- .elm - r -- r -- r -- bin bin r -- .profile - r -- r -- r -- bin bin r -- .profile.orig - rw ------- root sys --- .rhosts - r w - rw - rw[...]
-
Página 64
Section 2 - 34 SENTRY User ’ s Guide Fitzgerald & Long 2.5 COMMAND MAINTENANCE This program is used to update protection of VOC items in uniVerse, PI/open and UniData accounts. It is also a convenient means of reviewing the existing protection (created by SENTRY) which may be in effect. COMMA ND.MAINT Command Maintenance 08/08/00 Account Name[...]
-
Página 65
SENTRY User ’ s Guide Section 2 - 35 Fitzgerald & Long To execute this program, select 2. Database Maintenance Menu from SENTRY's Main Menu ; then, select 5. Database Commands from the Database Maintenance Menu. The Command Maintenance program will be invoked. A detailed description o f the data entry screen (Figure 33) and prompts follo[...]
-
Página 66
Section 2 - 36 SENTRY User ’ s Guide Fitzgerald & Long X - Execute from inside a program only UX - Both use at database prompt and from within a program ALL - Unlimited use NONE - No use The default protection is “ NONE ” . 4. Users - Enter the user ID for which you wish to define protection rights. The user ID must already exist on the S[...]
-
Página 67
SENTRY User ’ s Guide Section 2 - 37 Fitzgerald & Long Enter Field Number, "F"ile, "DEL"ete or <ESC> to Exit: - This is the main modifications prompt for this data entry screen. If you wish to change any of the information, enter the number assoc iated with the entry field, 1 through 7. The cursor will move to the se[...]
-
Página 68
Section 2 - 38 SENTRY User ’ s Guide Fitzgerald & Long 2.6 USER ITEM PROTECTION MAINTENANCE This is a special SENTRY feature which allows you to define SENTRY security objects. These objects may be accessed through subroutine calls to solve unique security problems which may not be met thro ugh permissions and VOC item security facilities. Fo[...]
-
Página 69
SENTRY User ’ s Guide Section 2 - 39 Fitzgerald & Long To execute this program, select 2. Database Maintenance Menu from SE NTRY's Main Menu ; then, select 6. User Defined Items from the Database Maintenance Menu . The User Item Protection Maintenance program will be invoked. A detailed description of the data entry screen (Figure 34) an[...]
-
Página 70
Section 2 - 40 SENTRY User ’ s Guide Fitzgerald & Long 5. Groups - This is a input window used to enter the groups associated with this User Item. Enter the name of a group. The groups entered must already exist in the SENTRY database. A list of groups may be viewed by entering " @ " at this input prompt. A group may be entered only[...]
-
Página 71
SENTRY User ’ s Guide Section 2 - 41 Fitzgerald & Long To save changes you have made to the User Items, enter " F " to file. After filing or deleting a User Item, the screen will be repainted and you will be prompted for a User Item name. To enter another Account Name press <RETURN>. Enter <RETURN> at the Account Name pr[...]
-
Página 72
Section 2 - 42 SENTRY User ’ s Guide Fitzgerald & Long Enter Line # of Groups (or Users) (1 - N), "A"dd, "F"orward or "B"ack Page: - When using the Groups or Users windows, you will see the prompt "Enter line # of Groups (or Users) (1 - n) or " A "dd. If there are more than five entries in a window[...]
-
Página 73
SENTRY User ’ s Guide Section 3 - 1 Fitzg erald & Long 3. INTRODUCING THE REPORTS MENU The third selection on SENTRY's Main Menu is 3. Reports Menu . Through this selection you may print reports documenting the system environment, user details, group details, and VOC item protection. SENTRY Main Menu 07 AUG 2000 1. Database Creation and [...]
-
Página 74
Section 3 - 2 SENTRY User ’ s Guide Fitzgerald & Long 3.0 REPORTS MENU This is the third submenu accessible from SENTRY's Main Menu . All reports are printed from this menu. You may select any of six reports. Set your default printer parameters BEFORE entering SENTR Y. SENTRY Reports Menu 07 AUG 2000 1. System Profile 2. User Profiles 3.[...]
-
Página 75
SENTRY User ’ s Guide Section 3 - 3 Fitzg erald & Long Selection five Command Protection , is the same information as selection four except the report is sorted by the name of the command which is protected. A list of accounts where that command is prot ected is displayed. Choosing selection six, Access Violations , prints the SENTRY Violatio[...]
-
Página 76
Section 3 - 4 SENTRY User ’ s Guide Fitzgerald & Long 3.1 SYSTEM PROFILE REPORT Selection one, System Profile , generates a report detailing the contents of SENTRY ’ s system limits record. These parameters are used by SENTRY to enforce password, user ID and group name lengths in keeping with the limitations of your version of UNIX and stan[...]
-
Página 77
SENTRY User ’ s Guide Section 3 - 5 Fitzg erald & Long Minimum Password Length - This is a UNIX defined parameter as well as one used by SENTRY when new users are created. Passwords may be 0 (zero) to “ your maximum value ” in length. However, most UNIX systems do not recognize more than 8 (eight) characters. More than 8 are ignored. The [...]
-
Página 78
Section 3 - 6 SENTRY User ’ s Guide Fitzgerald & Long embedded numeric. The default and recommended value is ALPHA which will generate a string of alphabetic characters, the length defined by the Minimum Password Length field. If the minimum len gth field is 0 or null, a password of 6 characters will be used unless otherwise specified when th[...]
-
Página 79
SENTRY User ’ s Guide Section 3 - 7 Fitzg erald & Long Maximum user ID Length - This field contains a number defining the maximum number of characters allowed for a user ID. Most UNIX systems allow up to 8 alphanumeric characters. This field is used by the User Profile data entry screen to limit the length of user IDs c reated through SENTRY [...]
-
Página 80
Section 3 - 8 SENTRY User ’ s Guide Fitzgerald & Long Punct for File Indexing - SENTRY builds B - trees to provide rapid cross referencing into the file system. For example, let ’ s imagine that you are looking for a file called “ payroll.something ” . You can ’ t r emember the “something ” . In the File System screen you may ente[...]
-
Página 81
SENTRY User ’ s Guide Section 3 - 9 Fitzg erald & Long 3.2 USER PROFILES The SENTRY User Profile Report displays all parameters in effect for each user re gistered in your system. Additionally such information as the users name, department and telephone may be added to the system data. SENTRY.USERS.REPORT SENTRY User Details 12:15:01 08 - 08 [...]
-
Página 82
Section 3 - 10 SENTRY User ’ s Guide Fitzgerald & Long UID - UNIX maintains a relationship between users and files by assigning ownership via the UID, the user ’ s number. To maintain the translation of UIDs to user IDs (used by the file system), t he Administrator should take care when creating or changing this relationship. GID Name - Whe[...]
-
Página 83
SENTRY User ’ s Guide Section 3 - 11 Fitzg erald & Long 3.3 GROUPS REPORT The SENTRY Groups Report displays, in a very concise format, all data related to groups on your system. Along with the name and description of each group are all user IDs associated with the group. The user ’ s relationship with each group (GID or supplementary) is re[...]
-
Página 84
Section 3 - 12 SENTRY User ’ s Guide Fitzgerald & Long GID for Users - The users listed in this field are assigned this group in the passwd file . It is commonly referred to as their GID group or primary group. Description - This is a free form text field to be used by the System Administrator to document the usage of groups on your UNIX syst[...]
-
Página 85
SENTRY User ’ s Guide Section 3 - 13 Fitzg erald & Long 3.4 ACCOUNT PROTECTION REPORT This is a report of all protected commands on your system. It is sorted by account such that there is one page per account printed. Note that the account pathname appears in the title of the report. SENTRY.ACCOUNTS.REPORT Commands Protected in Account /users[...]
-
Página 86
Section 3 - 14 SENTRY User ’ s Guide Fitzgerald & Long Description - The description field is used for documentation and may be entered through the Database Maintenance program for Database Commands. Group Name & Rights - This field displays the names of groups (if any) used to define the access to this command and the rights given to the[...]
-
Página 87
SENTRY User ’ s Guide Section 3 - 15 Fitzg erald & Long 3.5 COMMAND P ROTECTION REPORT The SENTRY Command Protection Report presents an alphabetical listing of all commands protected through SENTRY's Database Commands program. SENTRY.COMMANDS.REPORT Command Protection as of 12:16:37 08 - 08 - 00 Commands: Verbs, Sent, Menu, Group Name Us[...]
-
Página 88
Section 3 - 16 SENTRY User ’ s Guide Fitzgerald & Long Group Name & Rights - This field displays the names of groups (if any) used to define the access to this command and the rights given to these groups. The names of the groups MUST be registered UNIX group names. This field may be multi - valued. User Name & Rights - Displayed in t[...]
-
Página 89
SENTRY User ’ s Guide Section 3 - 17 Fitzg erald & Long 3.6 ACCESS VIOLATIONS REPORT The SENTRY Access V iolations Report is an audit report of violations logged by SENTRY for Database Commands and for User Defined Items. Each attempt to use a restricted command by an unauthorized user is reported here. SENTRY.VIOLATION.REPORT SENTRY Acce ss [...]
-
Página 90
Section 3 - 18 SENTRY User ’ s Guide Fitzgerald & Long Pathname - This is the pathname to the account containing the protected VOC item which was used by an unauthorized user. Violation Item - This field provides documentation on which Command was used. Messages beginning with "Command Executed" indicate that the command was used wi[...]
-
Página 91
SENTRY User ’ s Guide Section 4 - 1 Fitzgerald & Long 4. INTRODUCING THE UTILITIES MENU The Utilities Menu is executed through selectio n four on the SENTRY Main Menu . The programs provided in this selection are ancillary to the job of providing sound, well documented system security. These utility programs offer conveniences such as duplica[...]
-
Página 92
Section 4 - 2 SENTRY User ’ s Guide Fitzgerald & Long 4.0 UTILITIES MENU This menu provides access to five utility programs designed to save the System Administrator data entry effort and time in performing global tasks such as generating an d protecting an account "like" another account, purging the Violations Log on a selective ba[...]
-
Página 93
SENTRY User ’ s Guide Section 4 - 3 Fitzgerald & Long Selection four, Rebuild SENTRY Cross Reference Files . Sentry maintains a number of traditional inverted lists which are used for cross referencing. When you use the “@” function you are accessing one of these lists. Should you enc ounter a list where an item appears as “NOT FOUND ?[...]
-
Página 94
Section 4 - 4 SENTRY User ’ s Guide Fitzgerald & Long 4.1 VOC PR OTECTION SETUP This program provides the convenience of being able to copy the protection set on VOC items in one account to a second account. For a system with numerous accounts needing the same or similar protection, this program provides an automated process of creating VOC p[...]
-
Página 95
SENTRY User ’ s Guide Section 4 - 5 Fitzgerald & Long 4.2 PUGING THE VIOLATIONS LOG This program provides a convenient method of selectively purging the SENTRY Violations Log. You may purge by record key, dates, ports, USER ID, or account name. To invoke this program enter 4, Utilities Menu , from the SENTRY Main Menu ; then select 3, Purge t[...]
-
Página 96
Section 4 - 6 SENTRY User ’ s Guide Fitzgerald & Long This program is constructing a query sentence to SELECT the items to be purged. When entering your criteria, think of it as though you were completing the phrase "WITH field.name EQ (or LT, GT)" to th e items you enter.[...]
-
Página 97
SENTRY User ’ s Guide Section 4 - 7 Fitzgerald & Long 4.3 PASSWORD CREATION This program provides a convenient utility to assist you in creating new passwords for a number of users. You may select users to be changed based upon IDs, department, project, group, and user name. Through thi s utility you may change all passwords on a regular basi[...]
-
Página 98
Section 4 - 8 SENTRY User ’ s Guide Fitzgerald & Long MM/DD/YY. Sentry will select all users whose password update date is earlier than this dat e. If there is no date in this field, the record will not be selected.[...]
-
Página 99
SENTRY User ’ s Guide Section 4 - 9 Fitzgerald & Long 4. Department - If you have entered data into the “department ” field of the SENTRY.USERS file, you may use this field in your selection criteria for generating new passwords. Enter the department names separated by spaces. There is no validation on this field. Please check your entrie[...]
-
Página 100
Section 4 - 10 SENTRY User ’ s Guide Fitzgerald & Long 4.4 REBUILD CROSS REFERENCE FILES SENTRY maintains a number of traditional inverted lists which are used for cross referencin g. When you use the “@” function you are accessing one of these lists. Should you encounter a list where an item appears as “NOT FOUND ” or an item doesn ?[...]
-
Página 101
SENTRY User ’ s Guide Section 4 - 11 Fitzgerald & Long 4.5 UPDATE PROTECTED COMMANDS UPDATE.VOC Command Update 09/18/00 Account Name : _____________________________________________________ Enter the pathname to an account or ‘ ALL ’ for all accounts. Figure 46 - This is an example of the screen used to re - load the VOC protection for one[...]
-
Página 102
[...]
-
Página 103
SENTRY User ’ s Guide Appendix 1 - 1 Fitzgerald & Long APPENDIX 1 SENTRY INTERNAL SUBROUTINES NOTICE The subroutines documented in this appendix are provided as a convenience to the user on a "USE AT YOUR OWN RISK" basis. If you wish to use these programs and need assistance we are willing to help. However, because we cannot prevent[...]
-
Página 104
Appendix 1 - 2 SENTRY User ’ s Guide Fitzgerald & Long This is the result of the encryption. If the data string is already encrypted and the encryption key is the same as was used to encrypt the data, the result will be the decrypted data. ENCRYPTION.KEY (Input) This is a character string between 10 and 100 characters long that is to be used [...]
-
Página 105
SENTRY User ’ s Guide Appendix 1 - 3 Fitzgerald & Long WRITE CRYPT.DATA ON FILE.VAR, REC.KEY DISPLAY.DECRYPTED SENTRY.ENCRYPT = "*SEN TRY.ENCRYPT" READ THE.RECORD FROM FILE.VAR, REC.KEY ELSE ... THE.KEY = "Fudge Tastes Good!" CALL @SENTRY.ENCRYPT(THE.RECORD, OUT.DATA, THE.KEY) PRINT OUT.DATA It is critical that the encrypt[...]
-
Página 106
Appendix 1 - 4 SENTRY User ’ s Guide Fitzgerald & Long ERROR.TEXT = “””” CALL @SENTRY.USER.ITEM.CONTROL(USER.ITEM, ITEM. FOUND, ACCESS.RIGHTS, ERROR.TEXT) Parameters: USER.ITEM (Input) This is the name of the item that was defined with the SENTRY User Item Maintenance screen. ITEM.FOUND (Output) The item requested is searched for in t[...]
-
Página 107
SENTRY User ’ s Guide Appendix 1 - 5 Fitzgerald & Long If an error was encountered by the subroutine, an error message will be returned. If no error occurred ERROR.TEXT will be null.[...]
-
Página 108
Appendix 1 - 6 SENTRY User ’ s Guide Fitzgerald & Long Subroutine: SENTRY.VIOLATION.STAMP SENTRY.VIOLATION.STAMP is used to log access violations o f user items. Sample : SENTRY.VIOLATION.STAMP = "*SENTRY.VIOLATION.STAMP" CALL @SENTRY.VIOLATION.STAMP(USER.ITEM, COMMENT) Parameters: USER.ITEM (Input) The user - defined item for which[...]
-
Página 109
SENTRY User ’ s Guide Appendix 1 - 7 Fitzgerald & Long[...]
-
Página 110
[...]
-
Página 111
SENTRY User ’ s Guide Appendix 2 - 1 Fitzgerald & Long APPENDIX 2 SENTRY KEY BINDINGS A record called "KEY.BINDINGS" in the SENTRY.CONTROL file is used to control t he keystrokes used to activate special functions within the SENTRY data entry screens. For example, the "normal" way to exit from a data entry screen is by ent[...]
-
Página 112
Appendix 2 - 2 SENTRY User ’ s Guide Fitzgerald & Long environment and reenter SENTRY in order for the changes to take effect because these variables are rea d into named COMMON. NOTE : DO NOT enter the quote marks.[...]
-
Página 113
SENTRY User ’ s Guide Appendix 2 - 3 Fitzgerald & Long[...]