Chapter 3 |
3
|
Managing Users and Groups
|
3.1
|
Managing Network User Accounts
|
3.1.1
|
Built-In User Accounts
|
3.1.2
|
Types of User Accounts
|
3.1.3
|
User Account Attributes
|
3.1.4
|
Creating User Accounts
|
3.1.4.1
|
Creating a Network User Account
|
3.1.4.1.1
|
Creating a Global User Account
|
3.1.4.1.2
|
Verifying That the User Has Been Added
|
3.1.4.1.3
|
Creating a Local User Account
|
3.1.4.2
|
Creating User Account Templates
|
3.1.4.3
|
Copying User Accounts
|
3.1.5
|
Specifying Passwords
|
3.1.5.1
|
Changing a User Password
|
3.1.6
|
Specifying Group Membership
|
3.1.7
|
Specifying Logon Hours
|
3.1.8
|
Specifying Logon Scripts
|
3.1.8.1
|
Setting Up a Logon Script
|
3.1.8.2
|
Providing User Access to Logon Scripts
|
3.1.9
|
Specifying Workstations
|
3.1.10
|
Specifying Home Directories
|
3.1.11
|
Specifying User Account Expiration Dates
|
3.1.12
|
Specifying User Profiles
|
3.1.13
|
Displaying User Accounts
|
3.1.13.1
|
Example: Sorting the Display by User Full Name
|
3.1.13.2
|
Example: Reviewing User Account Settings for a Specific User
|
3.1.14
|
Modifying User Accounts
|
3.1.14.1
|
Example: Adding an Existing User to a Group
|
3.1.14.2
|
Example: Changing a user's logon hours
|
3.1.15
|
Disabling and Removing User Accounts
|
3.1.15.1
|
Disabling a User Account
|
3.1.15.2
|
Deleting a User Account
|
3.1.16
|
User Account Host Mapping
|
3.1.16.1
|
Implicit and Explicit Host Mapping
|
3.1.16.2
|
Establishing User Account Host Mapping
|
3.1.16.2.1
|
Setting Up Explicit Host Mapping
|
3.1.16.2.2
|
Displaying Host Mapping
|
3.1.17
|
External Authentication
|
3.1.17.1
|
Configuring the Server Capacity for External Authentication
|
3.1.17.2
|
Synchronizing Passwords
|
3.1.17.3
|
Bypassing External Authentication When the Network Is Down
|
3.1.17.4
|
Logging On to Externally Authenticated Accounts
|
3.1.17.5
|
Avoiding User Name Conflicts
|
3.1.17.6
|
Setting Up External Authentication by a Trusted Domain
|
3.1.17.7
|
Changing the Default Domain for External Authentication
|
3.1.17.8
|
Requirement for External Authentication Over DECnet-Plus
|
3.2
|
Managing Advanced Server Groups
|
3.2.1
|
Built-In Groups
|
3.2.2
|
Setting Up User Groups
|
3.2.3
|
Adding Users to Groups
|
3.2.3.1
|
Adding Members to a New Group
|
3.2.4
|
Copying Groups
|
3.2.5
|
Modifying a Group
|
3.2.5.1
|
Adding a Member to an Existing Group
|
3.2.5.2
|
Removing a Member From a Group
|
3.2.5.3
|
Changing the Description of a Group
|
3.2.6
|
Deleting a Group
|
Chapter 4 |
4
|
Managing Directory and File Sharing
|
4.1
|
Planning Directory and File Sharing
|
4.1.1
|
Disk Resources
|
4.1.2
|
Advanced Server Security Models
|
4.1.2.1
|
Advanced Server Only Security Model
|
4.1.2.1.1
|
Windows NT Security Descriptors
|
4.1.2.2
|
Advanced Server and OpenVMS Security Model
|
4.1.2.2.1
|
RMS Protections
|
4.1.2.2.2
|
Access Control Lists (ACLs)
|
4.1.3
|
The Advanced Server and Windows NT Security Information
|
4.1.3.1
|
Inheritance of Directory Permissions
|
4.1.3.2
|
Inheritance of Ownership
|
4.1.3.3
|
ACEs and OpenVMS Volume Index Files
|
4.1.3.4
|
How the File Server Reads Windows NT Security Information on Files
|
4.1.3.5
|
How the Advanced Server File Server Builds File Security Descriptor Information
|
4.1.3.6
|
Streamlining Security Information Storage and Lookups
|
4.1.3.6.1
|
Managing the Index File on a Volume with Shared Files
|
4.1.3.6.2
|
Determining the Number of Index File Headers to Allocate
|
4.1.3.7
|
Removing PATHWORKS ACEs
|
4.1.3.8
|
Displaying Advanced Server for OpenVMS and PATHWORKS ACEs
|
4.1.4
|
Controlling User Access to Disk Resources
|
4.1.4.1
|
Administrator Access
|
4.1.4.2
|
Group Access
|
4.1.4.3
|
User Access
|
4.1.4.4
|
Access Checks
|
4.2
|
Administrative Shares
|
4.2.1
|
The ADMIN$ Share
|
4.2.2
|
The IPC$ Share
|
4.2.3
|
Disk Administrative Shares
|
4.2.3.1
|
Autoshare Names
|
4.2.3.2
|
Defining Autoshares
|
4.2.3.3
|
The Autoshare Parameter
|
4.2.3.4
|
The NoAutoshare Parameter
|
4.2.3.5
|
Sharing DECdfs Devices
|
4.2.3.6
|
Autosharing in an OpenVMS Cluster Environment
|
4.2.3.7
|
Synchronizing Autoshares
|
4.3
|
Managing Shared Directories and Files
|
4.3.1
|
Default Shares
|
4.3.2
|
Creating a Share
|
4.3.2.1
|
Preparing to Share a Directory
|
4.3.2.2
|
Planning Share Permissions
|
4.3.2.3
|
Creating a Share
|
4.3.2.4
|
Creating a Personal Share
|
4.3.2.4.1
|
Procedure for Creating a Personal Share
|
4.3.2.5
|
Stopping Directory Sharing
|
4.3.3
|
Displaying Information About Shares
|
4.3.3.1
|
Displaying Information About a Specific Share
|
4.3.3.2
|
Displaying Share Permissions
|
4.3.4
|
Changing Share Properties
|
4.3.5
|
Planning File and Directory Access Permissions
|
4.3.5.1
|
File and Directory Access Permissions
|
4.3.5.2
|
Setting Permissions on a File or Directory
|
4.3.5.3
|
Inheriting Permissions
|
4.3.6
|
Specifying File and Directory Access Permissions
|
4.3.7
|
Displaying File and Directory Access Permissions
|
4.3.8
|
Using Network Permissions and OpenVMS Protections
|
4.3.8.1
|
OpenVMS Protections
|
4.3.9
|
Auditing Directory and File Access
|
4.3.10
|
Taking Ownership of Files or Directories
|
4.3.10.1
|
Authorizing a User to Take Ownership of a File or Directory
|
4.3.10.2
|
Taking Ownership of a File or Directory
|
4.3.11
|
Managing Shares from a Windows NT Server
|
4.3.11.1
|
Adding a Share from a Windows NT Server
|
4.3.11.2
|
Displaying and Modifying Shares from a Windows NT Server
|
4.4
|
Unicode and Extended Character Sets
|
4.4.1
|
Requirements and Restrictions
|
4.4.2
|
Configuring Extended Character Sets
|
4.4.3
|
How the Advanced Server File Server Stores and Handles Character Data
|
4.4.3.1
|
File Name Storage and Handling on ODS-2 Volumes
|
4.4.3.2
|
File Name Storage and Handling on ODS-5 Volumes
|
4.4.4
|
How to Change the Way ADMINISTER Commands Handle and Display Extended Character Set Characters
|
4.4.4.1
|
How the Default Input and Output Modes Are Determined
|
4.4.4.2
|
Examples: How Each Mode Affects ADMINISTER Command Input and Output
|
4.4.4.3
|
How to Display the Current Mode Settings
|
4.4.5
|
Creating Print Shares with Unicode Extended Characters
|
4.5
|
Using ODS-5 Disk Volumes in the Advanced Server Environment
|
4.5.1
|
Requirements for Using Extended File Specifications and Extended Character Sets
|
4.5.2
|
Managing Shares on ODS-5 Disk Volumes
|
4.5.2.1
|
Displaying Shares and Files on ODS-5 Disk Volumes
|
4.5.2.2
|
Converting File Names
|
4.5.2.3
|
Displaying the Disk Volume Type
|
4.5.2.4
|
Specifying File Names in ADMINISTER Commands
|
4.5.2.5
|
Storing Files on ODS-5 Disk Volumes
|
4.5.2.5.1
|
MS-DOS and Windows File Naming
|
4.6
|
File Names for Files Stored on the Advanced Server
|
4.6.1
|
File Naming Conventions: ODS-2 and ODS-5 Comparisons
|
4.6.2
|
Support of Alias File Names
|
4.6.2.1
|
Advanced Server Alias File Names
|
4.6.2.2
|
Example Listing Showing Alias File Names
|