
Using
Abbreviations
for
A
ttribute
Names
and
V
alues
4.
T
o
end
the
acl_edit
session,
en
ter:
exit
Use
these
same
steps
to
view
the
IO
A
CL
p ermissions
b
y
substituting
-ic
for
-io
in
the
acl_edit
command.
T
o
view
the
ob
ject
p ermissions,
for
example,
if
y
ou
w
an
ted
to
view
the
p ermissions
that
a
serv
er
or
prin
ter
grants
to
users,
do
not
use
either
of
these
ags.
Y
ou
ha
v
e
set
the
securit
y
directory
IO
and
IC
A
CLs
to
give
certain
p ermissions
to
certain
groups.
No
w
that
y
ou
ha
v
e
done
this,
create
all
the
serv
ers
that
will
grant
those
p ermissions
to
those
groups.
Use
the
pdstartspl
command
to
create
the
sp o oler
Spool6 ,
and
the
pdstartsuv
command
to
create
the
sup ervisors
Super201 ,
Super202 ,
and
Super203 .
Eac
h
of
these
serv
ers,
and
ev
ery
ob
ject
that
is
or
will
b e
con
tained
in
eac
h
of
them,
grants
read
and
write
p ermission
for
the
Dept_6_OPs
group.
When
y
ou
ha
v
e
created
the
serv
ers,
edit
the
IO
A
CL
and
IC
A
CL
of
the
securit
y
directory
again.
Use
the
pro cedure
in
\Giving
a
Group
P
ermission
to
the
Securit
y
Directory
IO
and
IC
A
CLs".
This
time,
remov
e
the
group
from
the
IO
and
IC
A
CLs
of
the
securit
y
directory
.
This
prev
en
ts
serv
ers
created
at
a
later
time
and
their
ob
jects
from
granting
these
same
p ermissions.
Remo
ving
a
Group
from
the
Security
Directory
IO
and
IC
A
CLs
T
o
remov
e
the
Dept_6_OPs
group
read
and
write
p ermission
from
the
IO
A
CL
of
the
securit
y
directory
,
use
the
acl_edit
command
with
the
/.:/pdsec
soft
link.
1.
Use
the
-d
ag
to
delete
the
p ermissions
the
group
has
to
the
ob
ject.
F
or
example,
en
ter:
acl_edit
/.:/pdsec
-io
-d
group:Dept_6_OPs:
2.
Remo
v
e
the
Dept_6_OPs
group
read
and
write
p ermissions
for
the
IC
A
CL
of
the
securit
y
directory
.
F
or
example,
en
ter:
acl_edit
/.:/pdsec
-ic
-d
group:Dept_6_OPs:
The
securit
y
directory
IO
and
IC
A
CLs
no
longer
con
tain
en
tries
for
the
Dept_6_OPs
group.
An
y
serv
ers
no
w
created
will
not
give
this
group
an
y
p ermissions.
Remem
b er,
if
y
ou
delete
and
recreate
an
y
of
the
serv
ers
that
give
Managing
DCE
Security
for
HPDPS
8-17