HP (Hewlett-Packard) Sentry manuel d'utilisation
- Voir en ligne ou télécharger le manuel d’utilisation
- 113 pages
- 0.39 mb
Aller à la page of
Les manuels d’utilisation similaires
-
Printer
HP (Hewlett-Packard) HP 70004A
179 pages 6.52 mb -
Printer
HP (Hewlett-Packard) 2605
228 pages 3.74 mb -
Printer
HP (Hewlett-Packard) 6600
2 pages 0.67 mb -
Printer
HP (Hewlett-Packard) C7777A
31 pages 0.45 mb -
Printer
HP (Hewlett-Packard) C3917A
453 pages 4.22 mb -
Printer
HP (Hewlett-Packard) 9040mfp
260 pages 4.71 mb -
Printer
HP (Hewlett-Packard) 5100
3 pages 0.09 mb -
Printer
HP (Hewlett-Packard) HP DESIGNJET 700
11 pages 0.09 mb
Un bon manuel d’utilisation
Les règles imposent au revendeur l'obligation de fournir à l'acheteur, avec des marchandises, le manuel d’utilisation HP (Hewlett-Packard) Sentry. Le manque du manuel d’utilisation ou les informations incorrectes fournies au consommateur sont à la base d'une plainte pour non-conformité du dispositif avec le contrat. Conformément à la loi, l’inclusion du manuel d’utilisation sous une forme autre que le papier est autorisée, ce qui est souvent utilisé récemment, en incluant la forme graphique ou électronique du manuel HP (Hewlett-Packard) Sentry ou les vidéos d'instruction pour les utilisateurs. La condition est son caractère lisible et compréhensible.
Qu'est ce que le manuel d’utilisation?
Le mot vient du latin "Instructio", à savoir organiser. Ainsi, le manuel d’utilisation HP (Hewlett-Packard) Sentry décrit les étapes de la procédure. Le but du manuel d’utilisation est d’instruire, de faciliter le démarrage, l'utilisation de l'équipement ou l'exécution des actions spécifiques. Le manuel d’utilisation est une collection d'informations sur l'objet/service, une indice.
Malheureusement, peu d'utilisateurs prennent le temps de lire le manuel d’utilisation, et un bon manuel permet non seulement d’apprendre à connaître un certain nombre de fonctionnalités supplémentaires du dispositif acheté, mais aussi éviter la majorité des défaillances.
Donc, ce qui devrait contenir le manuel parfait?
Tout d'abord, le manuel d’utilisation HP (Hewlett-Packard) Sentry devrait contenir:
- informations sur les caractéristiques techniques du dispositif HP (Hewlett-Packard) Sentry
- nom du fabricant et année de fabrication HP (Hewlett-Packard) Sentry
- instructions d'utilisation, de réglage et d’entretien de l'équipement HP (Hewlett-Packard) Sentry
- signes de sécurité et attestations confirmant la conformité avec les normes pertinentes
Pourquoi nous ne lisons pas les manuels d’utilisation?
Habituellement, cela est dû au manque de temps et de certitude quant à la fonctionnalité spécifique de l'équipement acheté. Malheureusement, la connexion et le démarrage HP (Hewlett-Packard) Sentry ne suffisent pas. Le manuel d’utilisation contient un certain nombre de lignes directrices concernant les fonctionnalités spécifiques, la sécurité, les méthodes d'entretien (même les moyens qui doivent être utilisés), les défauts possibles HP (Hewlett-Packard) Sentry et les moyens de résoudre des problèmes communs lors de l'utilisation. Enfin, le manuel contient les coordonnées du service HP (Hewlett-Packard) en l'absence de l'efficacité des solutions proposées. Actuellement, les manuels d’utilisation sous la forme d'animations intéressantes et de vidéos pédagogiques qui sont meilleurs que la brochure, sont très populaires. Ce type de manuel permet à l'utilisateur de voir toute la vidéo d'instruction sans sauter les spécifications et les descriptions techniques compliquées HP (Hewlett-Packard) Sentry, comme c’est le cas pour la version papier.
Pourquoi lire le manuel d’utilisation?
Tout d'abord, il contient la réponse sur la structure, les possibilités du dispositif HP (Hewlett-Packard) Sentry, l'utilisation de divers accessoires et une gamme d'informations pour profiter pleinement de toutes les fonctionnalités et commodités.
Après un achat réussi de l’équipement/dispositif, prenez un moment pour vous familiariser avec toutes les parties du manuel d'utilisation HP (Hewlett-Packard) Sentry. À l'heure actuelle, ils sont soigneusement préparés et traduits pour qu'ils soient non seulement compréhensibles pour les utilisateurs, mais pour qu’ils remplissent leur fonction de base de l'information et d’aide.
Table des matières du manuel d’utilisation
-
Page 1
SENTRY The Integrated Security System Release 4 User Guide Fitzgerald & Long 12341 E. Cornell Avenue, #18 Aurora, Colorado 80014 - 3323 USA Phone: (303) 755 - 1102 FAX: (303) 755 - 1703[...]
-
Page 2
NOTICE The information contained in this guide is s ubject to change without notice. Fitzgerald & Long, Inc. shall not be liable for technical or editorial omissions made herein; nor for incidental or consequential damages resulting from the furnishing, performance, or use of this material. This guide con tains information protected by copyrigh[...]
-
Page 3
Table Of Contents USING THIS GUIDE ---------------------------------------------------------------------------------------- Intro - 1 USING THE SCREENS ------------------------------------------------------------------------------------ Intro - 3 INSTALLING SENTRY ------------------------------------------------------------------------------------ [...]
-
Page 4
[...]
-
Page 5
SENTRY User ’ s Guide Introduction - 1 Fitzgerald & Long USING THIS GUIDE The SENTRY User's Guide is comprehensive in its descriptions of all of SENTRY's menus, data entry screens and reports. The Guide follows the same structure as the SENTRY menu system. There are four major sections in SENTRY. These are: 1. Database Creation and [...]
-
Page 6
Introduction - 2 SENTRY User ’ s Guide Fitzgerald & Long PI/open the command prompt is indicated by a colon “ : ” while for uniVerse the prompt is a greater - than sign “ > ” .[...]
-
Page 7
SENTRY User ’ s Guide Introduction - 3 Fitzgerald & Long USING THE SCREENS SENTRY data entry screens feature some very helpful functions. These include "repaint", "backup", "escape" (exit without update), “execute ” and "help". The following parag raphs describe each function. Repaint ^^ <RETURN&[...]
-
Page 8
Introduction - 4 SENTRY User ’ s Guide Fitzgerald & Long Data Entry Conventions Underscore/underline When awaiting data, the cursor is positioned at t he beginning of the field. The field is delineated by underscores. A sentence describing the field is displayed at the bottom of the screen. No data appearing on the underscore is an indication[...]
-
Page 9
SENTRY User ’ s Guide Introduction - 5 Fitzgerald & Long INSTALLING SENTRY Installing the SENTRY software is very simple! Just follow these easy steps. If you encounter problems at any point, please call us for addi tional assistance. Before you begin, check your system to see if there is a possible conflict with the accounts we will be loadi[...]
-
Page 10
Introduction - 6 SENTRY User ’ s Guide Fitzgerald & Long 6. Notice a file named "install". This is a script which will perform the steps necessary to install the SENTRY software. Execute the script by entering: ./install 7. Next type the command to enter your database environment (uv, udt, piopen). You should now see the TCL prompt [...]
-
Page 11
SENTRY User ’ s Guide Introduction - 7 Fitzgerald & Long SENTRY Main Menu 07 AUG 2000 1. Database Creation and Validation Menu 2. Database Maintenance Menu 3. Reports Menu 4. Utilities Menu Please select one of the above: Figure 1 - Main Menu 11. At this point you are ready to begin loading your data into the SENTRY database. This procedure i[...]
-
Page 12
Introduction - 8 SENTRY User ’ s Guide Fitzgerald & Long GETTING STARTED This section describes how to invoke the SENTRY Main Menu. It also describes the copyright and the validation screen which will be displayed as you enter SENTRY. Additionally, the first three steps for loading the SENTRY database are presented. < < S E N T R Y - Se[...]
-
Page 13
SENTRY User ’ s Guide Introduction - 9 Fitzgerald & Long Our recommendation is that you create a userid called sentry with the UID of 0 (zero). This user will have “ sentry ” as its “home” directory and will invoke the database on login. Suggestion: use SENTRY to create this user while “get ting started ” with SENTRY. At TCL, ente[...]
-
Page 14
Introduction - 10 SENTRY User ’ s Guide Fitzgerald & Long This is a safety precaution. SENTRY is a very powerful tool and should only be used by the System Administrator or his designee. SENTRY is designed to be a single user utility. Therefore, only one user at a time is allowed into SENTRY. The third SENTRY screen (Figure 3) informs you tha[...]
-
Page 15
SENTRY User ’ s Guide Introduction - 11 Fitzgerald & Long wish to send the report to a specific printer, form or destination use the SETPTR command to set your printer parameters before executing this selection. After performi ng these steps your SENTRY database reflects the actual state of your system. You may now use the Database Maintenanc[...]
-
Page 16
Introduction - 12 SENTRY User ’ s Guide Fitzgerald & Long INTRODUCING THE MAIN MENU SENTRY'S Main Menu follows the copyright screen and the System Administrator validation screen. It is the entry point into the four submenu s. The four submenus are presented as selections 1 through 4 (Figure 4). SENTRY Main Menu 07 AUG 2000 1. Database C[...]
-
Page 17
SENTRY User ’ s Guide Introduction - 13 Fitzgerald & Long The first selection, Database Creation and Validation Menu offers access to programs which upload the information in the UNIX passwd and group files into SENTRY's database. Another program transverses the disks, reading the permissions, owner and group for each file and directory [...]
-
Page 18
[...]
-
Page 19
SENTRY User ’ s Guide Section 1 - 1 Fitzgerald & Long 1. INTRODUCING THE DATABASE CREATION AND VALIDATION MENU The first selection of SENTRY's Main Menu is Database Creation and Validation. This menu provides access to programs which will build SENTRY ’ s database from your existing user, group and file system data. SENTRY Main Menu 07[...]
-
Page 20
Section 1 - 2 SENTRY User ’ s Guide Fitzgerald & Long 1.0 DATABASE CREATION AND VALUDATION MENU This is the first submenu accessible from SENTRY's Ma in Menu. It is also the first selection you will make after installing SENTRY. Through this menu, you will execute programs which load all the UNIX passwd and group information on your syst[...]
-
Page 21
SENTRY User ’ s Guide Section 1 - 3 Fitzgerald & Long[...]
-
Page 22
Section 1 - 4 SENTRY User ’ s Guide Fitzgerald & Long 1.1 UPLOAD USER AND GROUP PROFILES FROM UNIX This program loads the data from the UNIX passwd and group files into the SENTRY database. Existing data in the SENTRY database is che cked and compared to that in these two files. The SENTRY database is updated to reflect the same configuration[...]
-
Page 23
SENTRY User ’ s Guide Section 1 - 5 Fitzgerald & Long We recommend: Upload the passwd and group files into the SENTRY databases on a regular basis to INSURE that SENT RY reflects an accurate view of your system. Because of the numerous file system changes which occur daily in the normal course of operations, we recommend that you execute the [...]
-
Page 24
Section 1 - 6 SENTRY User ’ s Guide Fitzgerald & Long 1.2 CR EATE DATABASE FROM FILE SYSTEM This section describes the program which create the B - trees to index your file system directories, files, file owners and groups. On a system with a very large number of files, this process may take a number of hours. This is a “ read only ” proc[...]
-
Page 25
SENTRY User ’ s Guide Section 1 - 7 Fitzgerald & Long 1.3 VALIDATE THE USER PROFILE DATABASE This p rogram is used to check the consistency of the users, groups and permissions which have been loaded into the SENTRY database via the first two programs described in this section. user IDs, groups, and their usage in the file system are analyzed[...]
-
Page 26
Section 1 - 8 SENTRY User ’ s Guide Fitzgerald & Long This program will generate a printed report, using whatever printer setup is in effect at the t ime the program is run. To modify the printer, destination or form, use the SETPTR command at the TCL prior to running the program. Alternatively, the SENTRY XEQ function may be used to execute [...]
-
Page 27
SENTRY User ’ s Guide Section 1 - 9 Fitzgerald & Long 3 . “Password for User XXXXX is less than N characters.” - The user “XXXXX ” ha s a password which is shorter than the minimum password length specified in the SENTRY System Profile screen, which is N . This user ’ s password should be updated to conform to the minimum length res[...]
-
Page 28
Section 1 - 10 SENTRY User ’ s Guide Fitzgerald & Long 5. “Group (GID) XXXXX on /ZZZZZ does not exist.” - The group number “XXXXX ” is the r egistered group for a disk object whose path is “ /ZZZZZ ” . However, the group does not exist in SENTRY. Possibly, the group once existed but has been deleted. The group for this disk object[...]
-
Page 29
SENTRY User ’ s Guide Section 1 - 11 Fitzgerald & Long[...]
-
Page 30
[...]
-
Page 31
SENTRY User ’ s Guide Section 2 - 1 Fitzgerald & Long 2. INTRODUCING THE DATABASE MAINTENANCE MENU The second selection on SENTRY's Main Menu is 2. Da tabase Maintenance Menu . Through this selection you may access data entry screens to create, delete and modify the system profile, user profiles, groups, permissions, file ownership and P[...]
-
Page 32
Section 2 - 2 SENTRY User ’ s Guide Fitzgerald & Long 2.0 DATABASE MAINTENANCE This is the second sub - menu access ible from SENTRY ’ s Main Menu. It is the menu you will use to make changes to the SENTRY database. You may create or modify users, groups and permissions through this menu. SENTRY Maintenance Menu 07 AUG 2000 1. System Profil[...]
-
Page 33
SENTRY User ’ s Guide Section 2 - 3 Fitzgerald & Long 4. File System. This entry allows you to scroll through your UNIX tree stru cture much like you do in Window ’ s File Manager. From this selection you may request “ file detail ” information which is read from the UNIX I - node. Included in this information is the last time the file [...]
-
Page 34
Section 2 - 4 SENTRY User ’ s Guide Fitzgerald & Long 2.1 SYSTEM PROFILE MAINTENANCE This data entry program is used to display and change the system profile parameters. A number of these parameters are system specific and must be set to reflect YOUR system ’ s limits. These parameters include maximums and minimums for password length, user[...]
-
Page 35
SENTRY User ’ s Guide Section 2 - 5 Fitzgerald & Long 1. Null Passwords Allowed - The default of this field is “ N ” . When set to “ N ” o, each user must have a password. If this field is set t o “ Y ” es, you may create a user with a null password. For good security, passwords should be mandatory. This field controls the data en[...]
-
Page 36
Section 2 - 6 SENTRY User ’ s Guide Fitzgerald & Long • Each password must contain at least two alphabetic characters and at least one numeric or special character. • Each password must differ from the user name and from any reverse or circular shift of that nam e. However, the System Administrator, (UID is zero) may create or change any [...]
-
Page 37
SENTRY User ’ s Guide Section 2 - 7 Fitzgerald & Long However, we recommend using UIDs smaller than 5 digits simply to make them easier to read. The d efault and recommended value for this field is 1000. 13. Maximum GID Number - This field defines the largest number which may be used as a GID. This maximum is a UNIX parameter. On some UNIX sy[...]
-
Page 38
Section 2 - 8 SENTRY User ’ s Guide Fitzgerald & Long Note that the indexing occurs at the time that the “ Create Database from File System ” program is run from the Database Creation and Validation Menu. If the punctuation characters used are changed, the program must be rerun to put the new indexing into effect. Enter field number to mo[...]
-
Page 39
SENTRY User ’ s Guide Section 2 - 9 Fitzgerald & Long 1. Minimum password change (days): Enter the number of days before a user is allowed to change his existing password. For example, if UNIX has just expired a users password and the user enters a new one, you can use this parameter to prevent the user from resetting his password to the old [...]
-
Page 40
Section 2 - 10 SENTRY User ’ s Guide Fitzgerald & Long 2.2 USER MAINTENANCE This data entry program is used to display, change, and delete user IDs, including documentation for the user, UID, GID, home directory, and initial startup command. Additionally, all supplementary groups are displayed in this screen. Supplementary groups may be added[...]
-
Page 41
SENTRY User ’ s Guide Section 2 - 11 Fitzgerald & Long SENTRY database using the user ’ s name, enter “ @ ” followed by the first or last name of the user. For example, if you wanted to search for user IDs for Peggy Long, you could enter “ @long ” . If there were more than one “long ” or if Peggy had more than one ID, a list wou[...]
-
Page 42
Section 2 - 12 SENTRY User ’ s Guide Fitzgerald & Long configured (through the System Profile screen) to generate alphanumeric passwords, which will contain at least 1 numeric character. If the System Profile is set to allow null passwords to be optional, you may <RETURN> past this prompt leaving it null. We do not recommend null passwo[...]
-
Page 43
SENTRY User ’ s Guide Section 2 - 13 Fitzgerald & Long 8. Command - This field normally defines the startup UNIX shell the user invokes. The System Profile provides a “default ” . If you wish to use the default yo u need only press <RETURN>. Otherwise, enter the path to the UNIX shell you wish this user to invoke at startup. 9. Grou[...]
-
Page 44
Section 2 - 14 SENTRY User ’ s Guide Fitzgerald & Long new password for 90 days before he was forced by UNIX to enter a new password. This is 90 calendar days. 3. Password change warning (days): Enter the number of days before a new password is required that you would like UNIX to warn the user that his passwo rd is about to expire. We recomm[...]
-
Page 45
SENTRY User ’ s Guide Section 2 - 15 Fitzgerald & Long To exit you must sav e your changes by entering “ F ” . If you make no changes or wish to cancel your session without saving changes, enter “ <ESC> “ . The User Maintenance screen will be redisplayed sans data. To delete a user enter “ DEL ” at this prompt. You will be p[...]
-
Page 46
Section 2 - 16 SENTRY User ’ s Guide Fitzgerald & Long /jaf Enter "<ESC>" to quit : Figure 17 - This is an example of the list of files owned by the user being deleted - Selection A. B) Continue to delete the user / leave files as they are. This option deletes the user from the passwd and group files but leaves the UID as the [...]
-
Page 47
SENTRY User ’ s Guide Section 2 - 17 Fitzgerald & Long D) Do not delete this user. This option allows the user to return to the main User Maintenance menu without altering the user ID or the file system. No changes are made. To select this option enter “ D ” . You will be returned to the User Maintenance screen. In summary, the User Maint[...]
-
Page 48
Section 2 - 18 SENTRY User ’ s Guide Fitzgerald & Long 2.3 GROUP MAINTENANCE Through this data entry program you may add and delete groups from the system, add a descriptive text field to document a group a nd assign the group ’ s GID. GROUP.MAINT Group Maintenance 08/07/00 Group : adm 1. Description : HP system group 2. GID : 4 Enter field[...]
-
Page 49
SENTRY User ’ s Guide Section 2 - 19 Fitzgerald & Long 2. GID - This is the number assigned to this group name. You may use “ @ ” for a list of all groups and their associated GID ’ s. You may assign a number or enter “ N ” and SENTRY will assign the next available number. Enter field number, “F”ile, “DIS”play users, “DEL?[...]
-
Page 50
Section 2 - 20 SENTRY User ’ s Guide Fitzgerald & Long In UNIX every file has an owner and a group. The references to owners and groups are the UID and the GID for each. The actual names are NOT stored, only the number. The numbers are transl ated by various UNIX utilities through a “lookup ” process in the passwd and group files. If a gr[...]
-
Page 51
SENTRY User ’ s Guide Section 2 - 21 Fitzgerald & Long GROUP.MAI NT Group Maintenance 08/14/00 Files owned by group 140 (devel) /jaf Enter "<ESC>" to quit : Figure 23 - This is an example of the list of files owned by the group “ devel ” . Selection A displays this list. B) Continue to delete the group/leave files as they [...]
-
Page 52
Section 2 - 22 SENTRY User ’ s Guide Fitzgerald & Long D) Do not delete this group. This option allows the user to return to the main Group Maintenance menu without altering the group or the file system. No changes are made. To select this option enter “ D ” . You will be returned to the Group Maintenance screen.[...]
-
Page 53
SENTRY User ’ s Guide Section 2 - 23 Fitzgerald & Long 2.4 FILE SYSTEM With this program you may change owners, groups and the permissions for any file or directory in your file system. With Sentry ’ s extensive B - tree system of cross references, you may use this program to locate the path to any object on your system. FILE .MANAGER Gener[...]
-
Page 54
Section 2 - 24 SENTRY User ’ s Guide Fitzgerald & Long FILE.MANAGER General File Utility 16:24:02 07 AUG 2000 CURSOR.MAIN ========================================================================= HELP for "Cursor Control and Commands" There are twenty comma nds which may be entered at any position on the screen. None of the commands[...]
-
Page 55
SENTRY User ’ s Guide Section 2 - 25 Fitzgerald & Long One of the most valuable functions of this program is the ability to find files and directories without knowing the full path or the full name in some cases. To use the cross reference enter “ @ ” . You will be prompted: Enter name for cross reference: In our following example, we use[...]
-
Page 56
Section 2 - 26 SENTRY User ’ s Guide Fitzgerald & Long FILE.MAINT Detailed File View 08/08/00 File Pathname : /.elm/last_read_mail File Type : normal file Inode : 11470 No of Links : 1 Size (Bytes) : 1129 Last Access : Wed Feb 1 10:11:35 2000 Last Modify : Wed Feb 1 10:11:35 2000 Last Change : Sat Aug 6 00:01:27 2000 1. Owner : 0 (peggy,root)[...]
-
Page 57
SENTRY User ’ s Guide Section 2 - 27 Fitzgerald & Long In the lower half of the screen the file owner, group and permissions are displayed. You may use this screen to modify a ny of these three fields. 1. Owner - SENTRY displays the UID of the file owner plus the user ID (may be more than one) for the displayed UID. To change the owner, enter[...]
-
Page 58
Section 2 - 28 SENTRY User ’ s Guide Fitzgerald & Long ACLs Maintenance Access Control Lists (ACLs) are an extension the standard UNIX file permissions. If you have attempted to provide database protection through the use of UNIX file permissions you will have experienced the limitation that each file may have only one owner and one owning gr[...]
-
Page 59
SENTRY User ’ s Guide Section 2 - 29 Fitzgerald & Long This is an example of the “ACL Maintenance Screen ” . Not all UNIX systems support ACLs. Additionally, you may elect not to use them. If your copy of SENTRY displays this screen you may create and change ACLs with this program. When this screen is displayed, the pathname of the select[...]
-
Page 60
Section 2 - 30 SENTRY User ’ s Guide Fitzgerald & Long[...]
-
Page 61
SENTRY User ’ s Guide Section 2 - 31 Fitzgerald & Long The next field “ 3. Permissions ” consists of three sets of three permissions. In our example they are “ rwx rwx --- ” . The first three, left most c haracters are the rights assigned to the Owner. The second set of characters are rights assigned to the Owning Group and the third [...]
-
Page 62
Section 2 - 32 SENTRY User ’ s Guide Fitzgerald & Long the user is not the owner and not a member of the group associated with a file, the permissions displayed for the user will be that of “other ” . The benefit of this feature is that you may browse through your file system, viewing access rights without having to know if a user is in a[...]
-
Page 63
SENTRY User ’ s Guide Section 2 - 33 Fitzgerald & Long FILE.MANAGER General File Ut ility 14:39:56 18 AUG 2000 Path : / (32 entries.) Access shown for group piadm (9) top... -- > drwx------ root mail --- .elm - r -- r -- r -- bin bin r -- .profile - r -- r -- r -- bin bin r -- .profile.orig - rw ------- root sys --- .rhosts - r w - rw - rw[...]
-
Page 64
Section 2 - 34 SENTRY User ’ s Guide Fitzgerald & Long 2.5 COMMAND MAINTENANCE This program is used to update protection of VOC items in uniVerse, PI/open and UniData accounts. It is also a convenient means of reviewing the existing protection (created by SENTRY) which may be in effect. COMMA ND.MAINT Command Maintenance 08/08/00 Account Name[...]
-
Page 65
SENTRY User ’ s Guide Section 2 - 35 Fitzgerald & Long To execute this program, select 2. Database Maintenance Menu from SENTRY's Main Menu ; then, select 5. Database Commands from the Database Maintenance Menu. The Command Maintenance program will be invoked. A detailed description o f the data entry screen (Figure 33) and prompts follo[...]
-
Page 66
Section 2 - 36 SENTRY User ’ s Guide Fitzgerald & Long X - Execute from inside a program only UX - Both use at database prompt and from within a program ALL - Unlimited use NONE - No use The default protection is “ NONE ” . 4. Users - Enter the user ID for which you wish to define protection rights. The user ID must already exist on the S[...]
-
Page 67
SENTRY User ’ s Guide Section 2 - 37 Fitzgerald & Long Enter Field Number, "F"ile, "DEL"ete or <ESC> to Exit: - This is the main modifications prompt for this data entry screen. If you wish to change any of the information, enter the number assoc iated with the entry field, 1 through 7. The cursor will move to the se[...]
-
Page 68
Section 2 - 38 SENTRY User ’ s Guide Fitzgerald & Long 2.6 USER ITEM PROTECTION MAINTENANCE This is a special SENTRY feature which allows you to define SENTRY security objects. These objects may be accessed through subroutine calls to solve unique security problems which may not be met thro ugh permissions and VOC item security facilities. Fo[...]
-
Page 69
SENTRY User ’ s Guide Section 2 - 39 Fitzgerald & Long To execute this program, select 2. Database Maintenance Menu from SE NTRY's Main Menu ; then, select 6. User Defined Items from the Database Maintenance Menu . The User Item Protection Maintenance program will be invoked. A detailed description of the data entry screen (Figure 34) an[...]
-
Page 70
Section 2 - 40 SENTRY User ’ s Guide Fitzgerald & Long 5. Groups - This is a input window used to enter the groups associated with this User Item. Enter the name of a group. The groups entered must already exist in the SENTRY database. A list of groups may be viewed by entering " @ " at this input prompt. A group may be entered only[...]
-
Page 71
SENTRY User ’ s Guide Section 2 - 41 Fitzgerald & Long To save changes you have made to the User Items, enter " F " to file. After filing or deleting a User Item, the screen will be repainted and you will be prompted for a User Item name. To enter another Account Name press <RETURN>. Enter <RETURN> at the Account Name pr[...]
-
Page 72
Section 2 - 42 SENTRY User ’ s Guide Fitzgerald & Long Enter Line # of Groups (or Users) (1 - N), "A"dd, "F"orward or "B"ack Page: - When using the Groups or Users windows, you will see the prompt "Enter line # of Groups (or Users) (1 - n) or " A "dd. If there are more than five entries in a window[...]
-
Page 73
SENTRY User ’ s Guide Section 3 - 1 Fitzg erald & Long 3. INTRODUCING THE REPORTS MENU The third selection on SENTRY's Main Menu is 3. Reports Menu . Through this selection you may print reports documenting the system environment, user details, group details, and VOC item protection. SENTRY Main Menu 07 AUG 2000 1. Database Creation and [...]
-
Page 74
Section 3 - 2 SENTRY User ’ s Guide Fitzgerald & Long 3.0 REPORTS MENU This is the third submenu accessible from SENTRY's Main Menu . All reports are printed from this menu. You may select any of six reports. Set your default printer parameters BEFORE entering SENTR Y. SENTRY Reports Menu 07 AUG 2000 1. System Profile 2. User Profiles 3.[...]
-
Page 75
SENTRY User ’ s Guide Section 3 - 3 Fitzg erald & Long Selection five Command Protection , is the same information as selection four except the report is sorted by the name of the command which is protected. A list of accounts where that command is prot ected is displayed. Choosing selection six, Access Violations , prints the SENTRY Violatio[...]
-
Page 76
Section 3 - 4 SENTRY User ’ s Guide Fitzgerald & Long 3.1 SYSTEM PROFILE REPORT Selection one, System Profile , generates a report detailing the contents of SENTRY ’ s system limits record. These parameters are used by SENTRY to enforce password, user ID and group name lengths in keeping with the limitations of your version of UNIX and stan[...]
-
Page 77
SENTRY User ’ s Guide Section 3 - 5 Fitzg erald & Long Minimum Password Length - This is a UNIX defined parameter as well as one used by SENTRY when new users are created. Passwords may be 0 (zero) to “ your maximum value ” in length. However, most UNIX systems do not recognize more than 8 (eight) characters. More than 8 are ignored. The [...]
-
Page 78
Section 3 - 6 SENTRY User ’ s Guide Fitzgerald & Long embedded numeric. The default and recommended value is ALPHA which will generate a string of alphabetic characters, the length defined by the Minimum Password Length field. If the minimum len gth field is 0 or null, a password of 6 characters will be used unless otherwise specified when th[...]
-
Page 79
SENTRY User ’ s Guide Section 3 - 7 Fitzg erald & Long Maximum user ID Length - This field contains a number defining the maximum number of characters allowed for a user ID. Most UNIX systems allow up to 8 alphanumeric characters. This field is used by the User Profile data entry screen to limit the length of user IDs c reated through SENTRY [...]
-
Page 80
Section 3 - 8 SENTRY User ’ s Guide Fitzgerald & Long Punct for File Indexing - SENTRY builds B - trees to provide rapid cross referencing into the file system. For example, let ’ s imagine that you are looking for a file called “ payroll.something ” . You can ’ t r emember the “something ” . In the File System screen you may ente[...]
-
Page 81
SENTRY User ’ s Guide Section 3 - 9 Fitzg erald & Long 3.2 USER PROFILES The SENTRY User Profile Report displays all parameters in effect for each user re gistered in your system. Additionally such information as the users name, department and telephone may be added to the system data. SENTRY.USERS.REPORT SENTRY User Details 12:15:01 08 - 08 [...]
-
Page 82
Section 3 - 10 SENTRY User ’ s Guide Fitzgerald & Long UID - UNIX maintains a relationship between users and files by assigning ownership via the UID, the user ’ s number. To maintain the translation of UIDs to user IDs (used by the file system), t he Administrator should take care when creating or changing this relationship. GID Name - Whe[...]
-
Page 83
SENTRY User ’ s Guide Section 3 - 11 Fitzg erald & Long 3.3 GROUPS REPORT The SENTRY Groups Report displays, in a very concise format, all data related to groups on your system. Along with the name and description of each group are all user IDs associated with the group. The user ’ s relationship with each group (GID or supplementary) is re[...]
-
Page 84
Section 3 - 12 SENTRY User ’ s Guide Fitzgerald & Long GID for Users - The users listed in this field are assigned this group in the passwd file . It is commonly referred to as their GID group or primary group. Description - This is a free form text field to be used by the System Administrator to document the usage of groups on your UNIX syst[...]
-
Page 85
SENTRY User ’ s Guide Section 3 - 13 Fitzg erald & Long 3.4 ACCOUNT PROTECTION REPORT This is a report of all protected commands on your system. It is sorted by account such that there is one page per account printed. Note that the account pathname appears in the title of the report. SENTRY.ACCOUNTS.REPORT Commands Protected in Account /users[...]
-
Page 86
Section 3 - 14 SENTRY User ’ s Guide Fitzgerald & Long Description - The description field is used for documentation and may be entered through the Database Maintenance program for Database Commands. Group Name & Rights - This field displays the names of groups (if any) used to define the access to this command and the rights given to the[...]
-
Page 87
SENTRY User ’ s Guide Section 3 - 15 Fitzg erald & Long 3.5 COMMAND P ROTECTION REPORT The SENTRY Command Protection Report presents an alphabetical listing of all commands protected through SENTRY's Database Commands program. SENTRY.COMMANDS.REPORT Command Protection as of 12:16:37 08 - 08 - 00 Commands: Verbs, Sent, Menu, Group Name Us[...]
-
Page 88
Section 3 - 16 SENTRY User ’ s Guide Fitzgerald & Long Group Name & Rights - This field displays the names of groups (if any) used to define the access to this command and the rights given to these groups. The names of the groups MUST be registered UNIX group names. This field may be multi - valued. User Name & Rights - Displayed in t[...]
-
Page 89
SENTRY User ’ s Guide Section 3 - 17 Fitzg erald & Long 3.6 ACCESS VIOLATIONS REPORT The SENTRY Access V iolations Report is an audit report of violations logged by SENTRY for Database Commands and for User Defined Items. Each attempt to use a restricted command by an unauthorized user is reported here. SENTRY.VIOLATION.REPORT SENTRY Acce ss [...]
-
Page 90
Section 3 - 18 SENTRY User ’ s Guide Fitzgerald & Long Pathname - This is the pathname to the account containing the protected VOC item which was used by an unauthorized user. Violation Item - This field provides documentation on which Command was used. Messages beginning with "Command Executed" indicate that the command was used wi[...]
-
Page 91
SENTRY User ’ s Guide Section 4 - 1 Fitzgerald & Long 4. INTRODUCING THE UTILITIES MENU The Utilities Menu is executed through selectio n four on the SENTRY Main Menu . The programs provided in this selection are ancillary to the job of providing sound, well documented system security. These utility programs offer conveniences such as duplica[...]
-
Page 92
Section 4 - 2 SENTRY User ’ s Guide Fitzgerald & Long 4.0 UTILITIES MENU This menu provides access to five utility programs designed to save the System Administrator data entry effort and time in performing global tasks such as generating an d protecting an account "like" another account, purging the Violations Log on a selective ba[...]
-
Page 93
SENTRY User ’ s Guide Section 4 - 3 Fitzgerald & Long Selection four, Rebuild SENTRY Cross Reference Files . Sentry maintains a number of traditional inverted lists which are used for cross referencing. When you use the “@” function you are accessing one of these lists. Should you enc ounter a list where an item appears as “NOT FOUND ?[...]
-
Page 94
Section 4 - 4 SENTRY User ’ s Guide Fitzgerald & Long 4.1 VOC PR OTECTION SETUP This program provides the convenience of being able to copy the protection set on VOC items in one account to a second account. For a system with numerous accounts needing the same or similar protection, this program provides an automated process of creating VOC p[...]
-
Page 95
SENTRY User ’ s Guide Section 4 - 5 Fitzgerald & Long 4.2 PUGING THE VIOLATIONS LOG This program provides a convenient method of selectively purging the SENTRY Violations Log. You may purge by record key, dates, ports, USER ID, or account name. To invoke this program enter 4, Utilities Menu , from the SENTRY Main Menu ; then select 3, Purge t[...]
-
Page 96
Section 4 - 6 SENTRY User ’ s Guide Fitzgerald & Long This program is constructing a query sentence to SELECT the items to be purged. When entering your criteria, think of it as though you were completing the phrase "WITH field.name EQ (or LT, GT)" to th e items you enter.[...]
-
Page 97
SENTRY User ’ s Guide Section 4 - 7 Fitzgerald & Long 4.3 PASSWORD CREATION This program provides a convenient utility to assist you in creating new passwords for a number of users. You may select users to be changed based upon IDs, department, project, group, and user name. Through thi s utility you may change all passwords on a regular basi[...]
-
Page 98
Section 4 - 8 SENTRY User ’ s Guide Fitzgerald & Long MM/DD/YY. Sentry will select all users whose password update date is earlier than this dat e. If there is no date in this field, the record will not be selected.[...]
-
Page 99
SENTRY User ’ s Guide Section 4 - 9 Fitzgerald & Long 4. Department - If you have entered data into the “department ” field of the SENTRY.USERS file, you may use this field in your selection criteria for generating new passwords. Enter the department names separated by spaces. There is no validation on this field. Please check your entrie[...]
-
Page 100
Section 4 - 10 SENTRY User ’ s Guide Fitzgerald & Long 4.4 REBUILD CROSS REFERENCE FILES SENTRY maintains a number of traditional inverted lists which are used for cross referencin g. When you use the “@” function you are accessing one of these lists. Should you encounter a list where an item appears as “NOT FOUND ” or an item doesn ?[...]
-
Page 101
SENTRY User ’ s Guide Section 4 - 11 Fitzgerald & Long 4.5 UPDATE PROTECTED COMMANDS UPDATE.VOC Command Update 09/18/00 Account Name : _____________________________________________________ Enter the pathname to an account or ‘ ALL ’ for all accounts. Figure 46 - This is an example of the screen used to re - load the VOC protection for one[...]
-
Page 102
[...]
-
Page 103
SENTRY User ’ s Guide Appendix 1 - 1 Fitzgerald & Long APPENDIX 1 SENTRY INTERNAL SUBROUTINES NOTICE The subroutines documented in this appendix are provided as a convenience to the user on a "USE AT YOUR OWN RISK" basis. If you wish to use these programs and need assistance we are willing to help. However, because we cannot prevent[...]
-
Page 104
Appendix 1 - 2 SENTRY User ’ s Guide Fitzgerald & Long This is the result of the encryption. If the data string is already encrypted and the encryption key is the same as was used to encrypt the data, the result will be the decrypted data. ENCRYPTION.KEY (Input) This is a character string between 10 and 100 characters long that is to be used [...]
-
Page 105
SENTRY User ’ s Guide Appendix 1 - 3 Fitzgerald & Long WRITE CRYPT.DATA ON FILE.VAR, REC.KEY DISPLAY.DECRYPTED SENTRY.ENCRYPT = "*SEN TRY.ENCRYPT" READ THE.RECORD FROM FILE.VAR, REC.KEY ELSE ... THE.KEY = "Fudge Tastes Good!" CALL @SENTRY.ENCRYPT(THE.RECORD, OUT.DATA, THE.KEY) PRINT OUT.DATA It is critical that the encrypt[...]
-
Page 106
Appendix 1 - 4 SENTRY User ’ s Guide Fitzgerald & Long ERROR.TEXT = “””” CALL @SENTRY.USER.ITEM.CONTROL(USER.ITEM, ITEM. FOUND, ACCESS.RIGHTS, ERROR.TEXT) Parameters: USER.ITEM (Input) This is the name of the item that was defined with the SENTRY User Item Maintenance screen. ITEM.FOUND (Output) The item requested is searched for in t[...]
-
Page 107
SENTRY User ’ s Guide Appendix 1 - 5 Fitzgerald & Long If an error was encountered by the subroutine, an error message will be returned. If no error occurred ERROR.TEXT will be null.[...]
-
Page 108
Appendix 1 - 6 SENTRY User ’ s Guide Fitzgerald & Long Subroutine: SENTRY.VIOLATION.STAMP SENTRY.VIOLATION.STAMP is used to log access violations o f user items. Sample : SENTRY.VIOLATION.STAMP = "*SENTRY.VIOLATION.STAMP" CALL @SENTRY.VIOLATION.STAMP(USER.ITEM, COMMENT) Parameters: USER.ITEM (Input) The user - defined item for which[...]
-
Page 109
SENTRY User ’ s Guide Appendix 1 - 7 Fitzgerald & Long[...]
-
Page 110
[...]
-
Page 111
SENTRY User ’ s Guide Appendix 2 - 1 Fitzgerald & Long APPENDIX 2 SENTRY KEY BINDINGS A record called "KEY.BINDINGS" in the SENTRY.CONTROL file is used to control t he keystrokes used to activate special functions within the SENTRY data entry screens. For example, the "normal" way to exit from a data entry screen is by ent[...]
-
Page 112
Appendix 2 - 2 SENTRY User ’ s Guide Fitzgerald & Long environment and reenter SENTRY in order for the changes to take effect because these variables are rea d into named COMMON. NOTE : DO NOT enter the quote marks.[...]
-
Page 113
SENTRY User ’ s Guide Appendix 2 - 3 Fitzgerald & Long[...]