Previous | Contents | Index |
Uppercase and lowercase characters are equivalent. All lowercase characters are converted to uppercase before the password is encrypted. Avoid using the word password as the actual password.
Use the /PASSWORD qualifier as follows:
When you modify a password, the new password expires automatically; it is valid only once (unless you specify /NOPWDEXPIRED). On login, the user is forced to change the password (unless you specify /FLAGS=DISFORCE_PWD_CHANGE).
Note that the /GENERATE_PASSWORD and /PASSWORD qualifiers are mutually exclusive.
If decompressing libraries, make sure to set PGFLQUOTA to twice the size of the library.
By default, primary days are Monday through Friday and secondary days are Saturday and Sunday. If you omit a day from the list, AUTHORIZE uses the default value. (For example, if you omit Monday from the list, AUTHORIZE defines Monday as a primary day.)
Use the primary and secondary day definitions in conjunction with such qualifiers as /ACCESS, /INTERACTIVE, and /BATCH.
To prevent a password from expiring, specify the time as NONE. By default, a password expires in 90 days.
Each user must have a unique UIC. By default, the UIC value is [200,200].
The value cannot be greater than WSMAX. This quota value replaces smaller values of PQL_MWSDEFAULT.
The value is an integer equal to or greater than WSQUOTA. By default, the value is 1024 pages on VAX systems and 16384 pagelets on Alpha and I64 systems. The value cannot be greater than WSMAX. This quota value replaces smaller values of PQL_MWSEXTENT.
The value cannot be greater than the value of WSMAX and cannot exceed 8,192 pagelets on Alpha and I64 systems. This quota value replaces smaller values of PQL_MWSQUOTA.
The MODIFY command changes values in a SYSUAF user record. Most values not in the command remain unchanged. If the UIC is changed, the value of the corresponding identifier is also changed.Modifications to the user record are not retroactive; thus, any changes to quota values apply to the next process that is created but not to the current one.
#1 |
---|
UAF> MODIFY ROBIN /PASSWORD=SP0172 %UAF-I-MDFYMSG, user record(s) updated |
The command in this example changes the password for user ROBIN without altering any other values in the record.
#2 |
---|
UAF> MODIFY ROBIN/FLAGS=RESTRICTED %UAF-I-MDFYMSG, user record(s) updated |
The command in this example modifies the UAF record for user ROBIN by adding the login flag RESTRICTED.
Modifies an identifier name, its associated value, or its attributes in the rights database.
MODIFY/IDENTIFIER id-name
id-name
Specifies the name of an identifier to be modified.
/ATTRIBUTES=(keyword[,...])
Specifies attributes to be associated with the modified identifier. The following keywords are valid:
DYNAMIC Allows unprivileged holders of the identifier to remove and to restore the identifier from the process rights list by using the DCL command SET RIGHTS_LIST. HOLDER_HIDDEN Prevents people from getting a list of users who hold an identifier, unless they own the identifier themselves. NAME_HIDDEN Allows holders of an identifier to have it translated, either from binary to ASCII or from ASCII to binary, but prevents unauthorized users from translating the identifier. NOACCESS Makes any access rights of the identifier null and void. If a user is granted an identifier with the No Access attribute, that identifier has no effect on the user's access rights to objects. This attribute is a modifier for an identifier with the Resource or Subsystem attribute. RESOURCE Allows holders of an identifier to charge disk space to the identifier. Used only for file objects. SUBSYSTEM Allows holders of the identifier to create and maintain protected subsystems by assigning the Subsystem ACE to the application images in the subsystem. Used only for file objects. To remove an attribute from the identifier, add a NO prefix to the attribute keyword. For example, to remove the Resource attribute, specify /ATTRIBUTES=NORESOURCE.
Note
If you specify the NORESOURCE keyword without naming any holder with the /HOLDER qualifier, all holders lose the right to charge resources./HOLDER=username
Specifies the holder of an identifier whose attributes are to be modified. The /HOLDER qualifier is used only in conjunction with the /ATTRIBUTES qualifier.If you specify /HOLDER, the /NAME and /VALUE qualifiers are ignored.
/NAME=new-id-name
Specifies a new identifier name to be associated with the identifier./VALUE=value-specifier
Specifies a new identifier value. Note that an identifier value cannot be modified from a UIC to a non-UIC format or vice versa. The following formats are valid for the value-specifier:
IDENTIFIER:n An integer value in the range of 65,536 to 268,435,455. You can also specify the value in hexadecimal (precede the value with %X) or octal (precede the value with %O). To differentiate general identifiers from UIC identifiers, %X80000000 is added to the value you specify.
GID:n GID is the POSIX group identifier. It is an integer value in the range 0 to 16,777,215 (%XFFFFFF). The system will add %XA400.0000 to the value you specify and then enter this new value into the system RIGHTSLIST as an identifier. UIC:uic A UIC value in the standard UIC format.
The MODIFY/IDENTIFIER command changes identifier names, associated values, and attributes in the rights database. Values not specified in the command remain unchanged.
#1 |
---|
UAF> MODIFY/IDENTIFIER OLD_ID /NAME=NEW_ID %UAF-I-RDBMDFYMSG, identifier OLD_ID modified |
The command in this example changes the name of the OLD_ID identifier to NEW_ID.
#2 |
---|
UAF> MODIFY/IDENTIFIER/VALUE=UIC:[300,21] ACCOUNTING %UAF-I-RDBMDFYMSG, identifier ACCOUNTING modified |
The command in this example changes the old UIC value of the identifier ACCOUNTING to a new value.
#3 |
---|
UAF> MODIFY/IDENTIFIER/ATTRIBUTES=NORESOURCE- _UAF> /HOLDER=CRAMER ACCOUNTING %UAF-I-RDBMDFYMSG, identifier ACCOUNTING modified |
The command in this example associates the attribute NORESOURCE with the identifier ACCOUNTING in CRAMER's holder record. The identifier ACCOUNTING is not changed.
Modifies an entry in the network proxy authorization file to specify a different local account as the default proxy account for the remote user or to specify no default proxy account for the remote user.The command modifies an entry in the network proxy authorization file NET$PROXY.DAT and, to maintain compatibility with other systems, modifies an entry in NETPROXY.DAT.
Note
You must modify the proxy database from a system running the current OpenVMS system.
MODIFY/PROXY node::remote-user
node
Specifies a node name. If you specify an asterisk wildcard character (*), the specified remote user on all nodes is served by the local user.remote-user
Specifies the user name of a user at a remote node. If you specify an asterisk wildcard character, all users at the specified node are served by the local user.For systems that are not OpenVMS systems that implement DECnet, specifies the UIC of a user at a remote node. You can specify an asterisk wildcard in the group and member fields of the UIC.
/DEFAULT[=local-user]
Designates the default user name on the local node through which proxy access from the remote user is directed. If /NODEFAULT is specified, removes the default designation.
/NODEFAULT
Use the MODIFY/PROXY command to specify a different local account as the default proxy account for the remote user or to specify that there is no default proxy account for the remote user. Whenever you modify user entries, AUTHORIZE signals DECnet to update its volatile database. Proxy modifications take effect immediately on all nodes in a cluster that share the proxy database.The first command in the following example grants remote user STIR::YETTA proxy access to the PROXY1 and PROXY2 local accounts. The default proxy account is PROXY1. The second command changes the default proxy account to PROXY2.
UAF> ADD/PROXY STIR::YETTA PROXY1/DEFAULT, PROXY2 . . . UAF> MODIFY/PROXY STIR::YETTA /DEFAULT=PROXY2The next example shows the command used to remove the default proxy designation.
UAF> MODIFY/PROXY STIR::YETTA /NODEFAULTIf you remove the default proxy designation as shown in the last command, remote user STIR::YETTA must include the name of the proxy account (PROXY1 or PROXY2) in the access control string of each network operation to gain proxy access to the local system.
If no default proxy account is specified either in the network proxy database or in the access control string of the DCL command, the system attempts to perform the network operation using the default DECnet account.
UAF> MODIFY/PROXY MISHA::MARCO /DEFAULT=JOHNSON %UAF-I-NAFADDMSG, record successfully modified in NETPROXY.DAT |
The command in this example changes the default proxy account for user MARCO on the remote node MISHA to the JOHNSON account.
Changes the systemwide password.
Note
The systemwide password is different from the password for the SYSTEM user name. See the note in the Description.This command operates similarly to the DCL command SET PASSWORD/SYSTEM.
MODIFY/SYSTEM_PASSWORD= system-password
system-password
Specifies the new systemwide password.
None.
For a detailed description of the effects of this command, see the discussion of the SET PASSWORD/SYSTEM command in the HP OpenVMS Guide to System Security.
UAF> MODIFY/SYSTEM_PASSWORD=ABRACADABRA UAF> |
This command changes the systemwide password to ABRACADABRA.
Deletes a SYSUAF user record and corresponding identifiers in the rights database. The DEFAULT and SYSTEM records cannot be deleted.
Note
REMOVE/IDENTIFIER and REMOVE/PROXY are documented as separate commands.
REMOVE username
username
Specifies the name of a user in the SYSUAF.
/REMOVE_IDENTIFIER (default)
/NOREMOVE_IDENTIFIER
Specifies whether the user name and account name identifiers should be removed from the rights database when a record is removed from the UAF. If two UAF records have the same UIC, the user name identifier is removed only when the second record is deleted. Similarly, the account name identifier is removed only if there are no remaining UAF records with the same group as the deleted record.
If you remove a SYSUAF record for a user who also appears as a local user in the network user authorization file, every network authorization record for that user is also removed.
UAF> REMOVE ROBIN %UAF-I-REMMSG, record removed from SYSUAF.DAT %UAF-I-RDBREMMSGU, identifier ROBIN value: [000014,000006] removed from RIGHTSLIST.DAT |
The command in this example deletes the record for user ROBIN from the SYSUAF and ROBIN's UIC identifier from RIGHTSLIST.DAT.
Removes an identifier from the rights database.
REMOVE/IDENTIFIER id-name
id-name
Specifies the name of an identifier in the rights database.
None.
UAF> REMOVE/IDENTIFIER Q1SALES %UAF-I-RDBREMMSGU, identifier Q1SALES value %X80010024 removed from RIGHTSLIST.DAT |
The command in this example removes the identifier Q1SALES from the rights database. All of its holder records are removed with it.
Deletes network proxy access for the specified remote user.
REMOVE/PROXY node::remote-user [local-user,...]
node
Specifies the name of a network node in the network proxy authorization file.remote-user
Specifies the user name or UIC of a user on a remote node. The asterisk wildcard character (*) is permitted in the remote-user specification.local-user
Specifies the user name of from 1 to 16 users on the local node. If no local user is specified, proxy access to all local accounts is removed.
None.
UAF> REMOVE/PROXY MISHA::MARCO %UAF-I-NAFREMMSG, proxy from MISHA::MARCO to * removed |
The command in this example deletes the record for MISHA::MARCO from the network proxy authorization file, removing all proxy access to the local node for user MARCO on node MISHA.
Previous | Next | Contents | Index |