Introduction - 10
SENTRY User’s Guide
Fitzgerald & Long
This is a safety precaution. SENTRY is a very powerful tool and should only be used by the System
Administrator or his designee. SENTRY is designed to be a single user utility. Therefore, only one user at
a time is allowed into SENTRY.
The third SENTRY screen (Figure 3) informs you that SENTRY is validating that your user ID has a UID
of 0 (zero). If it does NOT, you will see the message:
“You must be a super-user to use SENTRY!”
The validation screen may flash by so quickly that you cannot read it because the test for UID = 0 is so
quick. Unless the validation fails, SENTRY will display the Main Menu.
The SENTRY Main Menu
There are four selections on the SENTRY Main Menu. These are:
1. Database Creation and Validation Menu
2. Database Maintenance Menu
3. Reports Menu
4. Utilities Menu
Choose selection one,
Database Creation and Validation Menu
. This selection presents another
menu which has three more choices. Each selection in each menu is documented thoroughly in the User
Guide. Simply look for the User Guide section that corresponds to the number of the menu selection. For
example, to get to the second selection of the Database Creation and Validation Menu you first entered “
1
”
from the Main Menu and then entered “
2
” from the next menu. In the User Guide you will find
documentation about this selection in section 1.2.
Read the appropriate section of the User Guide for each of the three selections in the Database Creation
and Validation Menu and then execute each one in turn. They perform the following tasks to setup your
SENTRY database:
1.
Upload User and Group Profiles from UNIX
- this program will read your UNIX passwd and
group files and create database records in SENTRY for all the users and groups which have been setup on
your system. The process will take just a few seconds.
2.
Create Database from File System
- this program scans the locals disks on your system and
builds cross reference information in SENTRY about the directories and files it finds. The cross reference
uses a sophisticated database structure known as a “balanced B-tree” - this will allow SENTRY to locate
objects on your disk nearly instantaneously! Because this is a complex task it will take longer, perhaps as
long as an hour or more. The appropriate section of the User Guide describes a technique for running this
program as a “phantom” or “background” task to avoid tying up your terminal.
3.
Validate the User Profile Database
- this program validates the logical integrity of the data you
have uploaded into SENTRY. It will print a report of any problems and inconsistencies it finds. If you
Содержание Sentry
Страница 4: ......
Страница 18: ......
Страница 21: ...SENTRY User s Guide Section 1 3 Fitzgerald Long ...
Страница 29: ...SENTRY User s Guide Section 1 11 Fitzgerald Long ...
Страница 30: ......
Страница 60: ...Section 2 30 SENTRY User s Guide Fitzgerald Long ...
Страница 102: ......
Страница 109: ...SENTRY User s Guide Appendix 1 7 Fitzgerald Long ...
Страница 110: ......
Страница 113: ...SENTRY User s Guide Appendix 2 3 Fitzgerald Long ...