Log:
Assessments - 0, GPA: 0 ( )

Instruções de Operação HP, Modelo HP Integrity NonStop H-Series

Fabricante : HP
Arquivo Tamanho: 492.93 kb
Arquivo Nome :
Língua de Ensino: en
Ir para baixar



por este dispositivo também tem outras instruções :

Facilidade de uso


SSG Component Configuration
SSGCONF Files
° USER - The request is accepted if the user ID of the requesting process
matches the user ID of the SSG. Otherwise the request is rejected with error
4848.
Note. This setting is the default for any CI that does not have a secure specification.
° GROUP - The request is accepted if the user ID of the requesting process is in
the same group as the user ID of the SSG or if the user ID of the requesting
process is in the SUPER group. Otherwise the request is rejected with error
4848.
° ANY - The request is accepted in all cases.
The various CI security settings determine the level to which a given SSG-controlled CI
is shared among different users. As described previously, the setting ranges from no
access for anyone (if the setting is NONE) to shared access for everyone (if the setting
is ANY). The CI settings are specified in the SSGCONF file, which is described in the
next subsection and in Section 4, SSG Commands.
SSGCONF Files
The SSG also provides the ability to define different CI security settings for different
users via user-specific SSGCONF files. When the SSG command interpreter
SSGCOM is run, it first reads SSG configuration data from the file
$SYSTEM.SYSTEM.SSGCONF. If the SSGCONFSEARCH option is set ON in that
file, SSGCOM then reads the user’s SSGCONF file from the user’s default subvolume.
This mechanism lets you set general SSG security rules in the
$SYSTEM.SYSTEM.SSGCONF file and then tailor those rules by user through the
user-specific SSGCONF files.
For example, you might want to institute a general policy that says that the CIs TACL
and SCF cannot be used by anyone via the SSG but then make an exception for
certain users. This policy could be configured as follows.
In the file $SYSTEM.SYSTEM.SSGCONF, add these lines:
SET SECURE TACL NONE ! No one can access TACL via the SSG
SET SECURE SCF NONE ! No one can access SCF via the SSG
SET SSGCONFSEARCH ON ! Read user’s SSGCONF file after processing this file

In the SGCONF file of each user who should have access to TACL and SCF using the
SSG, add these lines:
SET SECURE TACL USER ! This user can access TACL and SCF, but no sharing is
SET SECURE SCF USER ! available because security is USER, not GROUP or ANY

This configuration would allow the selected users to access TACL and SCF services
using the SSG but would deny that access to any other user on the system. Further,
because the security setting is USER, no sharing of CIs is possible. If the setting were
GROUP or ANY, sharing would be possible among the user’s group or all users,
respectively.
HP NonStop SeeView Server Gateway (SSG) Manual526356-004
3 -6


...

Este manual também é adequado para os modelos :
Computadores - HP Integrity NonStop J-Series (492.93 kb)
Computadores - HP NonStop G-Series (492.93 kb)
Computadores - HP NonStop L-Series (492.93 kb)

Escreva a sua própria avaliação do dispositivo



Mensagem
Seu nome :
Introduza os dois dígitos :
capcha





categorias