HP OpenVMS Guide to System Security > Part III Security for the
System AdministratorChapter 8 Controlling Access to System Data and Resources
Table of Contents This chapter describes how you design user groups and provide users with the identification (UICs, identifiers, privileges) they need to do their work. As part of the discussion, the chapter shows how to assign proper protection codes and ACLs to objects so that the user can work efficiently while, at the same time, system data and resources are properly protected. The chapter assumes you are familiar with the material in Chapter 4 “Protecting Data”Chapter 4 and Chapter 5 “Descriptions of Object Classes”Chapter 5. |