HP (Hewlett-Packard) Sentry manuale d’uso
- Visualizza on-line o scarica il manuale
- 113 pagine
- 0.39 mb
Vai alla pagina of
Manuali d’uso simili
-
Printer
HP (Hewlett-Packard) HP LaserJet 5
212 pagine 3.55 mb -
Printer
HP (Hewlett-Packard) 5700J
296 pagine 8.06 mb -
Printer
HP (Hewlett-Packard) 2600P
34 pagine 2.15 mb -
Printer
HP (Hewlett-Packard) P2035
4 pagine 0.14 mb -
Printer
HP (Hewlett-Packard) G55XI
35 pagine 0.48 mb -
Printer
HP (Hewlett-Packard) 2200
9 pagine 0.05 mb -
Printer
HP (Hewlett-Packard) LJ3150
11 pagine 0.42 mb -
Printer
HP (Hewlett-Packard) LaserJet
4 pagine 0.08 mb
Un buon manuale d’uso
Le regole impongono al rivenditore l'obbligo di fornire all'acquirente, insieme alle merci, il manuale d’uso HP (Hewlett-Packard) Sentry. La mancanza del manuale d’uso o le informazioni errate fornite al consumatore sono la base di una denuncia in caso di inosservanza del dispositivo con il contratto. Secondo la legge, l’inclusione del manuale d’uso in una forma diversa da quella cartacea è permessa, che viene spesso utilizzato recentemente, includendo una forma grafica o elettronica HP (Hewlett-Packard) Sentry o video didattici per gli utenti. La condizione è il suo carattere leggibile e comprensibile.
Che cosa è il manuale d’uso?
La parola deriva dal latino "instructio", cioè organizzare. Così, il manuale d’uso HP (Hewlett-Packard) Sentry descrive le fasi del procedimento. Lo scopo del manuale d’uso è istruire, facilitare lo avviamento, l'uso di attrezzature o l’esecuzione di determinate azioni. Il manuale è una raccolta di informazioni sull'oggetto/servizio, un suggerimento.
Purtroppo, pochi utenti prendono il tempo di leggere il manuale d’uso, e un buono manuale non solo permette di conoscere una serie di funzionalità aggiuntive del dispositivo acquistato, ma anche evitare la maggioranza dei guasti.
Quindi cosa dovrebbe contenere il manuale perfetto?
Innanzitutto, il manuale d’uso HP (Hewlett-Packard) Sentry dovrebbe contenere:
- informazioni sui dati tecnici del dispositivo HP (Hewlett-Packard) Sentry
- nome del fabbricante e anno di fabbricazione HP (Hewlett-Packard) Sentry
- istruzioni per l'uso, la regolazione e la manutenzione delle attrezzature HP (Hewlett-Packard) Sentry
- segnaletica di sicurezza e certificati che confermano la conformità con le norme pertinenti
Perché non leggiamo i manuali d’uso?
Generalmente questo è dovuto alla mancanza di tempo e certezza per quanto riguarda la funzionalità specifica delle attrezzature acquistate. Purtroppo, la connessione e l’avvio HP (Hewlett-Packard) Sentry non sono sufficienti. Questo manuale contiene una serie di linee guida per funzionalità specifiche, la sicurezza, metodi di manutenzione (anche i mezzi che dovrebbero essere usati), eventuali difetti HP (Hewlett-Packard) Sentry e modi per risolvere i problemi più comuni durante l'uso. Infine, il manuale contiene le coordinate del servizio HP (Hewlett-Packard) in assenza dell'efficacia delle soluzioni proposte. Attualmente, i manuali d’uso sotto forma di animazioni interessanti e video didattici che sono migliori che la brochure suscitano un interesse considerevole. Questo tipo di manuale permette all'utente di visualizzare tutto il video didattico senza saltare le specifiche e complicate descrizioni tecniche HP (Hewlett-Packard) Sentry, come nel caso della versione cartacea.
Perché leggere il manuale d’uso?
Prima di tutto, contiene la risposta sulla struttura, le possibilità del dispositivo HP (Hewlett-Packard) Sentry, l'uso di vari accessori ed una serie di informazioni per sfruttare totalmente tutte le caratteristiche e servizi.
Dopo l'acquisto di successo di attrezzature/dispositivo, prendere un momento per familiarizzare con tutte le parti del manuale d'uso HP (Hewlett-Packard) Sentry. Attualmente, sono preparati con cura e tradotti per essere comprensibili non solo per gli utenti, ma per svolgere la loro funzione di base di informazioni e di aiuto.
Sommario del manuale d’uso
-
Pagina 1
SENTRY The Integrated Security System Release 4 User Guide Fitzgerald & Long 12341 E. Cornell Avenue, #18 Aurora, Colorado 80014 - 3323 USA Phone: (303) 755 - 1102 FAX: (303) 755 - 1703[...]
-
Pagina 2
NOTICE The information contained in this guide is s ubject to change without notice. Fitzgerald & Long, Inc. shall not be liable for technical or editorial omissions made herein; nor for incidental or consequential damages resulting from the furnishing, performance, or use of this material. This guide con tains information protected by copyrigh[...]
-
Pagina 3
Table Of Contents USING THIS GUIDE ---------------------------------------------------------------------------------------- Intro - 1 USING THE SCREENS ------------------------------------------------------------------------------------ Intro - 3 INSTALLING SENTRY ------------------------------------------------------------------------------------ [...]
-
Pagina 4
[...]
-
Pagina 5
SENTRY User ’ s Guide Introduction - 1 Fitzgerald & Long USING THIS GUIDE The SENTRY User's Guide is comprehensive in its descriptions of all of SENTRY's menus, data entry screens and reports. The Guide follows the same structure as the SENTRY menu system. There are four major sections in SENTRY. These are: 1. Database Creation and [...]
-
Pagina 6
Introduction - 2 SENTRY User ’ s Guide Fitzgerald & Long PI/open the command prompt is indicated by a colon “ : ” while for uniVerse the prompt is a greater - than sign “ > ” .[...]
-
Pagina 7
SENTRY User ’ s Guide Introduction - 3 Fitzgerald & Long USING THE SCREENS SENTRY data entry screens feature some very helpful functions. These include "repaint", "backup", "escape" (exit without update), “execute ” and "help". The following parag raphs describe each function. Repaint ^^ <RETURN&[...]
-
Pagina 8
Introduction - 4 SENTRY User ’ s Guide Fitzgerald & Long Data Entry Conventions Underscore/underline When awaiting data, the cursor is positioned at t he beginning of the field. The field is delineated by underscores. A sentence describing the field is displayed at the bottom of the screen. No data appearing on the underscore is an indication[...]
-
Pagina 9
SENTRY User ’ s Guide Introduction - 5 Fitzgerald & Long INSTALLING SENTRY Installing the SENTRY software is very simple! Just follow these easy steps. If you encounter problems at any point, please call us for addi tional assistance. Before you begin, check your system to see if there is a possible conflict with the accounts we will be loadi[...]
-
Pagina 10
Introduction - 6 SENTRY User ’ s Guide Fitzgerald & Long 6. Notice a file named "install". This is a script which will perform the steps necessary to install the SENTRY software. Execute the script by entering: ./install 7. Next type the command to enter your database environment (uv, udt, piopen). You should now see the TCL prompt [...]
-
Pagina 11
SENTRY User ’ s Guide Introduction - 7 Fitzgerald & Long SENTRY Main Menu 07 AUG 2000 1. Database Creation and Validation Menu 2. Database Maintenance Menu 3. Reports Menu 4. Utilities Menu Please select one of the above: Figure 1 - Main Menu 11. At this point you are ready to begin loading your data into the SENTRY database. This procedure i[...]
-
Pagina 12
Introduction - 8 SENTRY User ’ s Guide Fitzgerald & Long GETTING STARTED This section describes how to invoke the SENTRY Main Menu. It also describes the copyright and the validation screen which will be displayed as you enter SENTRY. Additionally, the first three steps for loading the SENTRY database are presented. < < S E N T R Y - Se[...]
-
Pagina 13
SENTRY User ’ s Guide Introduction - 9 Fitzgerald & Long Our recommendation is that you create a userid called sentry with the UID of 0 (zero). This user will have “ sentry ” as its “home” directory and will invoke the database on login. Suggestion: use SENTRY to create this user while “get ting started ” with SENTRY. At TCL, ente[...]
-
Pagina 14
Introduction - 10 SENTRY User ’ s Guide Fitzgerald & Long This is a safety precaution. SENTRY is a very powerful tool and should only be used by the System Administrator or his designee. SENTRY is designed to be a single user utility. Therefore, only one user at a time is allowed into SENTRY. The third SENTRY screen (Figure 3) informs you tha[...]
-
Pagina 15
SENTRY User ’ s Guide Introduction - 11 Fitzgerald & Long wish to send the report to a specific printer, form or destination use the SETPTR command to set your printer parameters before executing this selection. After performi ng these steps your SENTRY database reflects the actual state of your system. You may now use the Database Maintenanc[...]
-
Pagina 16
Introduction - 12 SENTRY User ’ s Guide Fitzgerald & Long INTRODUCING THE MAIN MENU SENTRY'S Main Menu follows the copyright screen and the System Administrator validation screen. It is the entry point into the four submenu s. The four submenus are presented as selections 1 through 4 (Figure 4). SENTRY Main Menu 07 AUG 2000 1. Database C[...]
-
Pagina 17
SENTRY User ’ s Guide Introduction - 13 Fitzgerald & Long The first selection, Database Creation and Validation Menu offers access to programs which upload the information in the UNIX passwd and group files into SENTRY's database. Another program transverses the disks, reading the permissions, owner and group for each file and directory [...]
-
Pagina 18
[...]
-
Pagina 19
SENTRY User ’ s Guide Section 1 - 1 Fitzgerald & Long 1. INTRODUCING THE DATABASE CREATION AND VALIDATION MENU The first selection of SENTRY's Main Menu is Database Creation and Validation. This menu provides access to programs which will build SENTRY ’ s database from your existing user, group and file system data. SENTRY Main Menu 07[...]
-
Pagina 20
Section 1 - 2 SENTRY User ’ s Guide Fitzgerald & Long 1.0 DATABASE CREATION AND VALUDATION MENU This is the first submenu accessible from SENTRY's Ma in Menu. It is also the first selection you will make after installing SENTRY. Through this menu, you will execute programs which load all the UNIX passwd and group information on your syst[...]
-
Pagina 21
SENTRY User ’ s Guide Section 1 - 3 Fitzgerald & Long[...]
-
Pagina 22
Section 1 - 4 SENTRY User ’ s Guide Fitzgerald & Long 1.1 UPLOAD USER AND GROUP PROFILES FROM UNIX This program loads the data from the UNIX passwd and group files into the SENTRY database. Existing data in the SENTRY database is che cked and compared to that in these two files. The SENTRY database is updated to reflect the same configuration[...]
-
Pagina 23
SENTRY User ’ s Guide Section 1 - 5 Fitzgerald & Long We recommend: Upload the passwd and group files into the SENTRY databases on a regular basis to INSURE that SENT RY reflects an accurate view of your system. Because of the numerous file system changes which occur daily in the normal course of operations, we recommend that you execute the [...]
-
Pagina 24
Section 1 - 6 SENTRY User ’ s Guide Fitzgerald & Long 1.2 CR EATE DATABASE FROM FILE SYSTEM This section describes the program which create the B - trees to index your file system directories, files, file owners and groups. On a system with a very large number of files, this process may take a number of hours. This is a “ read only ” proc[...]
-
Pagina 25
SENTRY User ’ s Guide Section 1 - 7 Fitzgerald & Long 1.3 VALIDATE THE USER PROFILE DATABASE This p rogram is used to check the consistency of the users, groups and permissions which have been loaded into the SENTRY database via the first two programs described in this section. user IDs, groups, and their usage in the file system are analyzed[...]
-
Pagina 26
Section 1 - 8 SENTRY User ’ s Guide Fitzgerald & Long This program will generate a printed report, using whatever printer setup is in effect at the t ime the program is run. To modify the printer, destination or form, use the SETPTR command at the TCL prior to running the program. Alternatively, the SENTRY XEQ function may be used to execute [...]
-
Pagina 27
SENTRY User ’ s Guide Section 1 - 9 Fitzgerald & Long 3 . “Password for User XXXXX is less than N characters.” - The user “XXXXX ” ha s a password which is shorter than the minimum password length specified in the SENTRY System Profile screen, which is N . This user ’ s password should be updated to conform to the minimum length res[...]
-
Pagina 28
Section 1 - 10 SENTRY User ’ s Guide Fitzgerald & Long 5. “Group (GID) XXXXX on /ZZZZZ does not exist.” - The group number “XXXXX ” is the r egistered group for a disk object whose path is “ /ZZZZZ ” . However, the group does not exist in SENTRY. Possibly, the group once existed but has been deleted. The group for this disk object[...]
-
Pagina 29
SENTRY User ’ s Guide Section 1 - 11 Fitzgerald & Long[...]
-
Pagina 30
[...]
-
Pagina 31
SENTRY User ’ s Guide Section 2 - 1 Fitzgerald & Long 2. INTRODUCING THE DATABASE MAINTENANCE MENU The second selection on SENTRY's Main Menu is 2. Da tabase Maintenance Menu . Through this selection you may access data entry screens to create, delete and modify the system profile, user profiles, groups, permissions, file ownership and P[...]
-
Pagina 32
Section 2 - 2 SENTRY User ’ s Guide Fitzgerald & Long 2.0 DATABASE MAINTENANCE This is the second sub - menu access ible from SENTRY ’ s Main Menu. It is the menu you will use to make changes to the SENTRY database. You may create or modify users, groups and permissions through this menu. SENTRY Maintenance Menu 07 AUG 2000 1. System Profil[...]
-
Pagina 33
SENTRY User ’ s Guide Section 2 - 3 Fitzgerald & Long 4. File System. This entry allows you to scroll through your UNIX tree stru cture much like you do in Window ’ s File Manager. From this selection you may request “ file detail ” information which is read from the UNIX I - node. Included in this information is the last time the file [...]
-
Pagina 34
Section 2 - 4 SENTRY User ’ s Guide Fitzgerald & Long 2.1 SYSTEM PROFILE MAINTENANCE This data entry program is used to display and change the system profile parameters. A number of these parameters are system specific and must be set to reflect YOUR system ’ s limits. These parameters include maximums and minimums for password length, user[...]
-
Pagina 35
SENTRY User ’ s Guide Section 2 - 5 Fitzgerald & Long 1. Null Passwords Allowed - The default of this field is “ N ” . When set to “ N ” o, each user must have a password. If this field is set t o “ Y ” es, you may create a user with a null password. For good security, passwords should be mandatory. This field controls the data en[...]
-
Pagina 36
Section 2 - 6 SENTRY User ’ s Guide Fitzgerald & Long • Each password must contain at least two alphabetic characters and at least one numeric or special character. • Each password must differ from the user name and from any reverse or circular shift of that nam e. However, the System Administrator, (UID is zero) may create or change any [...]
-
Pagina 37
SENTRY User ’ s Guide Section 2 - 7 Fitzgerald & Long However, we recommend using UIDs smaller than 5 digits simply to make them easier to read. The d efault and recommended value for this field is 1000. 13. Maximum GID Number - This field defines the largest number which may be used as a GID. This maximum is a UNIX parameter. On some UNIX sy[...]
-
Pagina 38
Section 2 - 8 SENTRY User ’ s Guide Fitzgerald & Long Note that the indexing occurs at the time that the “ Create Database from File System ” program is run from the Database Creation and Validation Menu. If the punctuation characters used are changed, the program must be rerun to put the new indexing into effect. Enter field number to mo[...]
-
Pagina 39
SENTRY User ’ s Guide Section 2 - 9 Fitzgerald & Long 1. Minimum password change (days): Enter the number of days before a user is allowed to change his existing password. For example, if UNIX has just expired a users password and the user enters a new one, you can use this parameter to prevent the user from resetting his password to the old [...]
-
Pagina 40
Section 2 - 10 SENTRY User ’ s Guide Fitzgerald & Long 2.2 USER MAINTENANCE This data entry program is used to display, change, and delete user IDs, including documentation for the user, UID, GID, home directory, and initial startup command. Additionally, all supplementary groups are displayed in this screen. Supplementary groups may be added[...]
-
Pagina 41
SENTRY User ’ s Guide Section 2 - 11 Fitzgerald & Long SENTRY database using the user ’ s name, enter “ @ ” followed by the first or last name of the user. For example, if you wanted to search for user IDs for Peggy Long, you could enter “ @long ” . If there were more than one “long ” or if Peggy had more than one ID, a list wou[...]
-
Pagina 42
Section 2 - 12 SENTRY User ’ s Guide Fitzgerald & Long configured (through the System Profile screen) to generate alphanumeric passwords, which will contain at least 1 numeric character. If the System Profile is set to allow null passwords to be optional, you may <RETURN> past this prompt leaving it null. We do not recommend null passwo[...]
-
Pagina 43
SENTRY User ’ s Guide Section 2 - 13 Fitzgerald & Long 8. Command - This field normally defines the startup UNIX shell the user invokes. The System Profile provides a “default ” . If you wish to use the default yo u need only press <RETURN>. Otherwise, enter the path to the UNIX shell you wish this user to invoke at startup. 9. Grou[...]
-
Pagina 44
Section 2 - 14 SENTRY User ’ s Guide Fitzgerald & Long new password for 90 days before he was forced by UNIX to enter a new password. This is 90 calendar days. 3. Password change warning (days): Enter the number of days before a new password is required that you would like UNIX to warn the user that his passwo rd is about to expire. We recomm[...]
-
Pagina 45
SENTRY User ’ s Guide Section 2 - 15 Fitzgerald & Long To exit you must sav e your changes by entering “ F ” . If you make no changes or wish to cancel your session without saving changes, enter “ <ESC> “ . The User Maintenance screen will be redisplayed sans data. To delete a user enter “ DEL ” at this prompt. You will be p[...]
-
Pagina 46
Section 2 - 16 SENTRY User ’ s Guide Fitzgerald & Long /jaf Enter "<ESC>" to quit : Figure 17 - This is an example of the list of files owned by the user being deleted - Selection A. B) Continue to delete the user / leave files as they are. This option deletes the user from the passwd and group files but leaves the UID as the [...]
-
Pagina 47
SENTRY User ’ s Guide Section 2 - 17 Fitzgerald & Long D) Do not delete this user. This option allows the user to return to the main User Maintenance menu without altering the user ID or the file system. No changes are made. To select this option enter “ D ” . You will be returned to the User Maintenance screen. In summary, the User Maint[...]
-
Pagina 48
Section 2 - 18 SENTRY User ’ s Guide Fitzgerald & Long 2.3 GROUP MAINTENANCE Through this data entry program you may add and delete groups from the system, add a descriptive text field to document a group a nd assign the group ’ s GID. GROUP.MAINT Group Maintenance 08/07/00 Group : adm 1. Description : HP system group 2. GID : 4 Enter field[...]
-
Pagina 49
SENTRY User ’ s Guide Section 2 - 19 Fitzgerald & Long 2. GID - This is the number assigned to this group name. You may use “ @ ” for a list of all groups and their associated GID ’ s. You may assign a number or enter “ N ” and SENTRY will assign the next available number. Enter field number, “F”ile, “DIS”play users, “DEL?[...]
-
Pagina 50
Section 2 - 20 SENTRY User ’ s Guide Fitzgerald & Long In UNIX every file has an owner and a group. The references to owners and groups are the UID and the GID for each. The actual names are NOT stored, only the number. The numbers are transl ated by various UNIX utilities through a “lookup ” process in the passwd and group files. If a gr[...]
-
Pagina 51
SENTRY User ’ s Guide Section 2 - 21 Fitzgerald & Long GROUP.MAI NT Group Maintenance 08/14/00 Files owned by group 140 (devel) /jaf Enter "<ESC>" to quit : Figure 23 - This is an example of the list of files owned by the group “ devel ” . Selection A displays this list. B) Continue to delete the group/leave files as they [...]
-
Pagina 52
Section 2 - 22 SENTRY User ’ s Guide Fitzgerald & Long D) Do not delete this group. This option allows the user to return to the main Group Maintenance menu without altering the group or the file system. No changes are made. To select this option enter “ D ” . You will be returned to the Group Maintenance screen.[...]
-
Pagina 53
SENTRY User ’ s Guide Section 2 - 23 Fitzgerald & Long 2.4 FILE SYSTEM With this program you may change owners, groups and the permissions for any file or directory in your file system. With Sentry ’ s extensive B - tree system of cross references, you may use this program to locate the path to any object on your system. FILE .MANAGER Gener[...]
-
Pagina 54
Section 2 - 24 SENTRY User ’ s Guide Fitzgerald & Long FILE.MANAGER General File Utility 16:24:02 07 AUG 2000 CURSOR.MAIN ========================================================================= HELP for "Cursor Control and Commands" There are twenty comma nds which may be entered at any position on the screen. None of the commands[...]
-
Pagina 55
SENTRY User ’ s Guide Section 2 - 25 Fitzgerald & Long One of the most valuable functions of this program is the ability to find files and directories without knowing the full path or the full name in some cases. To use the cross reference enter “ @ ” . You will be prompted: Enter name for cross reference: In our following example, we use[...]
-
Pagina 56
Section 2 - 26 SENTRY User ’ s Guide Fitzgerald & Long FILE.MAINT Detailed File View 08/08/00 File Pathname : /.elm/last_read_mail File Type : normal file Inode : 11470 No of Links : 1 Size (Bytes) : 1129 Last Access : Wed Feb 1 10:11:35 2000 Last Modify : Wed Feb 1 10:11:35 2000 Last Change : Sat Aug 6 00:01:27 2000 1. Owner : 0 (peggy,root)[...]
-
Pagina 57
SENTRY User ’ s Guide Section 2 - 27 Fitzgerald & Long In the lower half of the screen the file owner, group and permissions are displayed. You may use this screen to modify a ny of these three fields. 1. Owner - SENTRY displays the UID of the file owner plus the user ID (may be more than one) for the displayed UID. To change the owner, enter[...]
-
Pagina 58
Section 2 - 28 SENTRY User ’ s Guide Fitzgerald & Long ACLs Maintenance Access Control Lists (ACLs) are an extension the standard UNIX file permissions. If you have attempted to provide database protection through the use of UNIX file permissions you will have experienced the limitation that each file may have only one owner and one owning gr[...]
-
Pagina 59
SENTRY User ’ s Guide Section 2 - 29 Fitzgerald & Long This is an example of the “ACL Maintenance Screen ” . Not all UNIX systems support ACLs. Additionally, you may elect not to use them. If your copy of SENTRY displays this screen you may create and change ACLs with this program. When this screen is displayed, the pathname of the select[...]
-
Pagina 60
Section 2 - 30 SENTRY User ’ s Guide Fitzgerald & Long[...]
-
Pagina 61
SENTRY User ’ s Guide Section 2 - 31 Fitzgerald & Long The next field “ 3. Permissions ” consists of three sets of three permissions. In our example they are “ rwx rwx --- ” . The first three, left most c haracters are the rights assigned to the Owner. The second set of characters are rights assigned to the Owning Group and the third [...]
-
Pagina 62
Section 2 - 32 SENTRY User ’ s Guide Fitzgerald & Long the user is not the owner and not a member of the group associated with a file, the permissions displayed for the user will be that of “other ” . The benefit of this feature is that you may browse through your file system, viewing access rights without having to know if a user is in a[...]
-
Pagina 63
SENTRY User ’ s Guide Section 2 - 33 Fitzgerald & Long FILE.MANAGER General File Ut ility 14:39:56 18 AUG 2000 Path : / (32 entries.) Access shown for group piadm (9) top... -- > drwx------ root mail --- .elm - r -- r -- r -- bin bin r -- .profile - r -- r -- r -- bin bin r -- .profile.orig - rw ------- root sys --- .rhosts - r w - rw - rw[...]
-
Pagina 64
Section 2 - 34 SENTRY User ’ s Guide Fitzgerald & Long 2.5 COMMAND MAINTENANCE This program is used to update protection of VOC items in uniVerse, PI/open and UniData accounts. It is also a convenient means of reviewing the existing protection (created by SENTRY) which may be in effect. COMMA ND.MAINT Command Maintenance 08/08/00 Account Name[...]
-
Pagina 65
SENTRY User ’ s Guide Section 2 - 35 Fitzgerald & Long To execute this program, select 2. Database Maintenance Menu from SENTRY's Main Menu ; then, select 5. Database Commands from the Database Maintenance Menu. The Command Maintenance program will be invoked. A detailed description o f the data entry screen (Figure 33) and prompts follo[...]
-
Pagina 66
Section 2 - 36 SENTRY User ’ s Guide Fitzgerald & Long X - Execute from inside a program only UX - Both use at database prompt and from within a program ALL - Unlimited use NONE - No use The default protection is “ NONE ” . 4. Users - Enter the user ID for which you wish to define protection rights. The user ID must already exist on the S[...]
-
Pagina 67
SENTRY User ’ s Guide Section 2 - 37 Fitzgerald & Long Enter Field Number, "F"ile, "DEL"ete or <ESC> to Exit: - This is the main modifications prompt for this data entry screen. If you wish to change any of the information, enter the number assoc iated with the entry field, 1 through 7. The cursor will move to the se[...]
-
Pagina 68
Section 2 - 38 SENTRY User ’ s Guide Fitzgerald & Long 2.6 USER ITEM PROTECTION MAINTENANCE This is a special SENTRY feature which allows you to define SENTRY security objects. These objects may be accessed through subroutine calls to solve unique security problems which may not be met thro ugh permissions and VOC item security facilities. Fo[...]
-
Pagina 69
SENTRY User ’ s Guide Section 2 - 39 Fitzgerald & Long To execute this program, select 2. Database Maintenance Menu from SE NTRY's Main Menu ; then, select 6. User Defined Items from the Database Maintenance Menu . The User Item Protection Maintenance program will be invoked. A detailed description of the data entry screen (Figure 34) an[...]
-
Pagina 70
Section 2 - 40 SENTRY User ’ s Guide Fitzgerald & Long 5. Groups - This is a input window used to enter the groups associated with this User Item. Enter the name of a group. The groups entered must already exist in the SENTRY database. A list of groups may be viewed by entering " @ " at this input prompt. A group may be entered only[...]
-
Pagina 71
SENTRY User ’ s Guide Section 2 - 41 Fitzgerald & Long To save changes you have made to the User Items, enter " F " to file. After filing or deleting a User Item, the screen will be repainted and you will be prompted for a User Item name. To enter another Account Name press <RETURN>. Enter <RETURN> at the Account Name pr[...]
-
Pagina 72
Section 2 - 42 SENTRY User ’ s Guide Fitzgerald & Long Enter Line # of Groups (or Users) (1 - N), "A"dd, "F"orward or "B"ack Page: - When using the Groups or Users windows, you will see the prompt "Enter line # of Groups (or Users) (1 - n) or " A "dd. If there are more than five entries in a window[...]
-
Pagina 73
SENTRY User ’ s Guide Section 3 - 1 Fitzg erald & Long 3. INTRODUCING THE REPORTS MENU The third selection on SENTRY's Main Menu is 3. Reports Menu . Through this selection you may print reports documenting the system environment, user details, group details, and VOC item protection. SENTRY Main Menu 07 AUG 2000 1. Database Creation and [...]
-
Pagina 74
Section 3 - 2 SENTRY User ’ s Guide Fitzgerald & Long 3.0 REPORTS MENU This is the third submenu accessible from SENTRY's Main Menu . All reports are printed from this menu. You may select any of six reports. Set your default printer parameters BEFORE entering SENTR Y. SENTRY Reports Menu 07 AUG 2000 1. System Profile 2. User Profiles 3.[...]
-
Pagina 75
SENTRY User ’ s Guide Section 3 - 3 Fitzg erald & Long Selection five Command Protection , is the same information as selection four except the report is sorted by the name of the command which is protected. A list of accounts where that command is prot ected is displayed. Choosing selection six, Access Violations , prints the SENTRY Violatio[...]
-
Pagina 76
Section 3 - 4 SENTRY User ’ s Guide Fitzgerald & Long 3.1 SYSTEM PROFILE REPORT Selection one, System Profile , generates a report detailing the contents of SENTRY ’ s system limits record. These parameters are used by SENTRY to enforce password, user ID and group name lengths in keeping with the limitations of your version of UNIX and stan[...]
-
Pagina 77
SENTRY User ’ s Guide Section 3 - 5 Fitzg erald & Long Minimum Password Length - This is a UNIX defined parameter as well as one used by SENTRY when new users are created. Passwords may be 0 (zero) to “ your maximum value ” in length. However, most UNIX systems do not recognize more than 8 (eight) characters. More than 8 are ignored. The [...]
-
Pagina 78
Section 3 - 6 SENTRY User ’ s Guide Fitzgerald & Long embedded numeric. The default and recommended value is ALPHA which will generate a string of alphabetic characters, the length defined by the Minimum Password Length field. If the minimum len gth field is 0 or null, a password of 6 characters will be used unless otherwise specified when th[...]
-
Pagina 79
SENTRY User ’ s Guide Section 3 - 7 Fitzg erald & Long Maximum user ID Length - This field contains a number defining the maximum number of characters allowed for a user ID. Most UNIX systems allow up to 8 alphanumeric characters. This field is used by the User Profile data entry screen to limit the length of user IDs c reated through SENTRY [...]
-
Pagina 80
Section 3 - 8 SENTRY User ’ s Guide Fitzgerald & Long Punct for File Indexing - SENTRY builds B - trees to provide rapid cross referencing into the file system. For example, let ’ s imagine that you are looking for a file called “ payroll.something ” . You can ’ t r emember the “something ” . In the File System screen you may ente[...]
-
Pagina 81
SENTRY User ’ s Guide Section 3 - 9 Fitzg erald & Long 3.2 USER PROFILES The SENTRY User Profile Report displays all parameters in effect for each user re gistered in your system. Additionally such information as the users name, department and telephone may be added to the system data. SENTRY.USERS.REPORT SENTRY User Details 12:15:01 08 - 08 [...]
-
Pagina 82
Section 3 - 10 SENTRY User ’ s Guide Fitzgerald & Long UID - UNIX maintains a relationship between users and files by assigning ownership via the UID, the user ’ s number. To maintain the translation of UIDs to user IDs (used by the file system), t he Administrator should take care when creating or changing this relationship. GID Name - Whe[...]
-
Pagina 83
SENTRY User ’ s Guide Section 3 - 11 Fitzg erald & Long 3.3 GROUPS REPORT The SENTRY Groups Report displays, in a very concise format, all data related to groups on your system. Along with the name and description of each group are all user IDs associated with the group. The user ’ s relationship with each group (GID or supplementary) is re[...]
-
Pagina 84
Section 3 - 12 SENTRY User ’ s Guide Fitzgerald & Long GID for Users - The users listed in this field are assigned this group in the passwd file . It is commonly referred to as their GID group or primary group. Description - This is a free form text field to be used by the System Administrator to document the usage of groups on your UNIX syst[...]
-
Pagina 85
SENTRY User ’ s Guide Section 3 - 13 Fitzg erald & Long 3.4 ACCOUNT PROTECTION REPORT This is a report of all protected commands on your system. It is sorted by account such that there is one page per account printed. Note that the account pathname appears in the title of the report. SENTRY.ACCOUNTS.REPORT Commands Protected in Account /users[...]
-
Pagina 86
Section 3 - 14 SENTRY User ’ s Guide Fitzgerald & Long Description - The description field is used for documentation and may be entered through the Database Maintenance program for Database Commands. Group Name & Rights - This field displays the names of groups (if any) used to define the access to this command and the rights given to the[...]
-
Pagina 87
SENTRY User ’ s Guide Section 3 - 15 Fitzg erald & Long 3.5 COMMAND P ROTECTION REPORT The SENTRY Command Protection Report presents an alphabetical listing of all commands protected through SENTRY's Database Commands program. SENTRY.COMMANDS.REPORT Command Protection as of 12:16:37 08 - 08 - 00 Commands: Verbs, Sent, Menu, Group Name Us[...]
-
Pagina 88
Section 3 - 16 SENTRY User ’ s Guide Fitzgerald & Long Group Name & Rights - This field displays the names of groups (if any) used to define the access to this command and the rights given to these groups. The names of the groups MUST be registered UNIX group names. This field may be multi - valued. User Name & Rights - Displayed in t[...]
-
Pagina 89
SENTRY User ’ s Guide Section 3 - 17 Fitzg erald & Long 3.6 ACCESS VIOLATIONS REPORT The SENTRY Access V iolations Report is an audit report of violations logged by SENTRY for Database Commands and for User Defined Items. Each attempt to use a restricted command by an unauthorized user is reported here. SENTRY.VIOLATION.REPORT SENTRY Acce ss [...]
-
Pagina 90
Section 3 - 18 SENTRY User ’ s Guide Fitzgerald & Long Pathname - This is the pathname to the account containing the protected VOC item which was used by an unauthorized user. Violation Item - This field provides documentation on which Command was used. Messages beginning with "Command Executed" indicate that the command was used wi[...]
-
Pagina 91
SENTRY User ’ s Guide Section 4 - 1 Fitzgerald & Long 4. INTRODUCING THE UTILITIES MENU The Utilities Menu is executed through selectio n four on the SENTRY Main Menu . The programs provided in this selection are ancillary to the job of providing sound, well documented system security. These utility programs offer conveniences such as duplica[...]
-
Pagina 92
Section 4 - 2 SENTRY User ’ s Guide Fitzgerald & Long 4.0 UTILITIES MENU This menu provides access to five utility programs designed to save the System Administrator data entry effort and time in performing global tasks such as generating an d protecting an account "like" another account, purging the Violations Log on a selective ba[...]
-
Pagina 93
SENTRY User ’ s Guide Section 4 - 3 Fitzgerald & Long Selection four, Rebuild SENTRY Cross Reference Files . Sentry maintains a number of traditional inverted lists which are used for cross referencing. When you use the “@” function you are accessing one of these lists. Should you enc ounter a list where an item appears as “NOT FOUND ?[...]
-
Pagina 94
Section 4 - 4 SENTRY User ’ s Guide Fitzgerald & Long 4.1 VOC PR OTECTION SETUP This program provides the convenience of being able to copy the protection set on VOC items in one account to a second account. For a system with numerous accounts needing the same or similar protection, this program provides an automated process of creating VOC p[...]
-
Pagina 95
SENTRY User ’ s Guide Section 4 - 5 Fitzgerald & Long 4.2 PUGING THE VIOLATIONS LOG This program provides a convenient method of selectively purging the SENTRY Violations Log. You may purge by record key, dates, ports, USER ID, or account name. To invoke this program enter 4, Utilities Menu , from the SENTRY Main Menu ; then select 3, Purge t[...]
-
Pagina 96
Section 4 - 6 SENTRY User ’ s Guide Fitzgerald & Long This program is constructing a query sentence to SELECT the items to be purged. When entering your criteria, think of it as though you were completing the phrase "WITH field.name EQ (or LT, GT)" to th e items you enter.[...]
-
Pagina 97
SENTRY User ’ s Guide Section 4 - 7 Fitzgerald & Long 4.3 PASSWORD CREATION This program provides a convenient utility to assist you in creating new passwords for a number of users. You may select users to be changed based upon IDs, department, project, group, and user name. Through thi s utility you may change all passwords on a regular basi[...]
-
Pagina 98
Section 4 - 8 SENTRY User ’ s Guide Fitzgerald & Long MM/DD/YY. Sentry will select all users whose password update date is earlier than this dat e. If there is no date in this field, the record will not be selected.[...]
-
Pagina 99
SENTRY User ’ s Guide Section 4 - 9 Fitzgerald & Long 4. Department - If you have entered data into the “department ” field of the SENTRY.USERS file, you may use this field in your selection criteria for generating new passwords. Enter the department names separated by spaces. There is no validation on this field. Please check your entrie[...]
-
Pagina 100
Section 4 - 10 SENTRY User ’ s Guide Fitzgerald & Long 4.4 REBUILD CROSS REFERENCE FILES SENTRY maintains a number of traditional inverted lists which are used for cross referencin g. When you use the “@” function you are accessing one of these lists. Should you encounter a list where an item appears as “NOT FOUND ” or an item doesn ?[...]
-
Pagina 101
SENTRY User ’ s Guide Section 4 - 11 Fitzgerald & Long 4.5 UPDATE PROTECTED COMMANDS UPDATE.VOC Command Update 09/18/00 Account Name : _____________________________________________________ Enter the pathname to an account or ‘ ALL ’ for all accounts. Figure 46 - This is an example of the screen used to re - load the VOC protection for one[...]
-
Pagina 102
[...]
-
Pagina 103
SENTRY User ’ s Guide Appendix 1 - 1 Fitzgerald & Long APPENDIX 1 SENTRY INTERNAL SUBROUTINES NOTICE The subroutines documented in this appendix are provided as a convenience to the user on a "USE AT YOUR OWN RISK" basis. If you wish to use these programs and need assistance we are willing to help. However, because we cannot prevent[...]
-
Pagina 104
Appendix 1 - 2 SENTRY User ’ s Guide Fitzgerald & Long This is the result of the encryption. If the data string is already encrypted and the encryption key is the same as was used to encrypt the data, the result will be the decrypted data. ENCRYPTION.KEY (Input) This is a character string between 10 and 100 characters long that is to be used [...]
-
Pagina 105
SENTRY User ’ s Guide Appendix 1 - 3 Fitzgerald & Long WRITE CRYPT.DATA ON FILE.VAR, REC.KEY DISPLAY.DECRYPTED SENTRY.ENCRYPT = "*SEN TRY.ENCRYPT" READ THE.RECORD FROM FILE.VAR, REC.KEY ELSE ... THE.KEY = "Fudge Tastes Good!" CALL @SENTRY.ENCRYPT(THE.RECORD, OUT.DATA, THE.KEY) PRINT OUT.DATA It is critical that the encrypt[...]
-
Pagina 106
Appendix 1 - 4 SENTRY User ’ s Guide Fitzgerald & Long ERROR.TEXT = “””” CALL @SENTRY.USER.ITEM.CONTROL(USER.ITEM, ITEM. FOUND, ACCESS.RIGHTS, ERROR.TEXT) Parameters: USER.ITEM (Input) This is the name of the item that was defined with the SENTRY User Item Maintenance screen. ITEM.FOUND (Output) The item requested is searched for in t[...]
-
Pagina 107
SENTRY User ’ s Guide Appendix 1 - 5 Fitzgerald & Long If an error was encountered by the subroutine, an error message will be returned. If no error occurred ERROR.TEXT will be null.[...]
-
Pagina 108
Appendix 1 - 6 SENTRY User ’ s Guide Fitzgerald & Long Subroutine: SENTRY.VIOLATION.STAMP SENTRY.VIOLATION.STAMP is used to log access violations o f user items. Sample : SENTRY.VIOLATION.STAMP = "*SENTRY.VIOLATION.STAMP" CALL @SENTRY.VIOLATION.STAMP(USER.ITEM, COMMENT) Parameters: USER.ITEM (Input) The user - defined item for which[...]
-
Pagina 109
SENTRY User ’ s Guide Appendix 1 - 7 Fitzgerald & Long[...]
-
Pagina 110
[...]
-
Pagina 111
SENTRY User ’ s Guide Appendix 2 - 1 Fitzgerald & Long APPENDIX 2 SENTRY KEY BINDINGS A record called "KEY.BINDINGS" in the SENTRY.CONTROL file is used to control t he keystrokes used to activate special functions within the SENTRY data entry screens. For example, the "normal" way to exit from a data entry screen is by ent[...]
-
Pagina 112
Appendix 2 - 2 SENTRY User ’ s Guide Fitzgerald & Long environment and reenter SENTRY in order for the changes to take effect because these variables are rea d into named COMMON. NOTE : DO NOT enter the quote marks.[...]
-
Pagina 113
SENTRY User ’ s Guide Appendix 2 - 3 Fitzgerald & Long[...]