(4)
Assign command groups to the user identity.
(5)
Enable login and/or authority checking for the terminal.
Notice all terminal and user identities are added to TAUTH and PAUTH and assigned command groups
before
login
and/or authority checking are configured. This ensures that the desired command group assignments are in place
before anyone is subject to authority checking on the device. If (5) was done between (1) and (2), then ALL input
requests from the terminal would be restricted until (2) is completed.
3.8.4.2 Administering User Identities
User identities defined with the admin command are used when authority checking is disabled ('n' authority level).
Be aware that the login/password database for 'n' authority is not the same database used for 't' and 'u' authority.
The admin command is documented in the Administration section of 235-700-200,
UNIX
®
System Reference
Manual
.
For 't' and 'u' authority levels person (user) identities are added to the person authority database via the
ADD:PAUTH
input message. The administrator specifies the user name (identity) and a password, which the user
will be forced to change at first login. For example:
ADD:PAUTH:IDENT="userid",PSSWD="userpass"
By default, a user identity has no command groups assigned (it is completely restricted). Because of this, it is
recommended that the administrator assign command groups to the user identity immediately after the identity is
added to the personal authority data base.
The administrator can override a user's password via the
CHG:PAUTH
. The user will be forced to choose a new
password upon his or her next login. For example:
CHG:PAUTH:IDENT="userid",PSSWD="newpass"
ADD:PAUTH
and
CHG:PAUTH
are not printed (echoed) on the ROP in order to keep passwords private.
A user identity is deleted from the person authority data base via the
DEL:PAUTH
input message. For example:
DEL:PAUTH:IDENT="userid"
The administrator can retrieve information about user identities from the person authority data base using the
VFY:PAUTH
input message. The following lists all user identities in the person authority data base:
VFY:PAUTH
The following reports the last login time for a given user identity:
VFY:PAUTH:IDENT="userid"
3.8.4.3 Administering Terminal Identities
The first step in administering terminal identities is to determine the terminal identity names for the terminals
involved. For example, the terminal identity for
/dev/ttyn
is
ttyn
.
A terminal identity is added to the terminal authority data base (TAUTH) via the
ADD:TAUTH
input message:
ADD:TAUTH:TERM="ttyn"
where
ttyn
is replaced with the desired terminal identity.
By default, a terminal identity has no command groups assigned (it is completely restricted). Because of this, it is
recommended that the administrator assign command groups to the terminal identity immediately after the identity is
added to the terminal authority data base.
A terminal identity is deleted from the terminal authority data base via the
DEL:TAUTH
input message. For example:
DEL:TAUTH:TERM="ttyn"
235-105-210
October 1999
Copyright © 1999
Page 28
Содержание 5ESS-2000
Страница 96: ...235 105 210 October 1999 Copyright 1999 Page 2 ...
Страница 184: ...235 105 210 October 1999 Copyright 1999 Page 3 ...
Страница 300: ...13 STOP YOU HAVE COMPLETED THIS PROCEDURE 235 105 210 October 1999 Copyright 1999 Page 55 ...
Страница 339: ...7 STOP YOU HAVE COMPLETED THIS PROCEDURE 235 105 210 October 1999 Copyright 1999 Page 13 ...
Страница 342: ...235 105 210 October 1999 Copyright 1999 Page 2 ...
Страница 359: ...235 105 210 October 1999 Copyright 1999 Page 5 ...
Страница 516: ...Figure 10 24 1 KS 23483 L13 Disk Drive Cable Connection Rear View 235 105 210 October 1999 Copyright 1999 Page 2 ...
Страница 517: ...Figure 10 24 2 KS 23483 L21 Disk Drive Cable Connection Rear View 235 105 210 October 1999 Copyright 1999 Page 3 ...
Страница 518: ...Figure 10 24 3 KS 23841 L15 Disk Drive Cable Connection Rear View 235 105 210 October 1999 Copyright 1999 Page 4 ...
Страница 523: ...Figure 10 24 6 Top View of DUP Showing Internal Cabling 235 105 210 October 1999 Copyright 1999 Page 9 ...
Страница 609: ...2 STOP YOU HAVE COMPLETED THIS PROCEDURE 235 105 210 October 1999 Copyright 1999 Page 12 ...
Страница 628: ...a SM inhibited Response OK 2 STOP YOU HAVE COMPLETED THIS PROCEDURE 235 105 210 October 1999 Copyright 1999 Page 8 ...
Страница 653: ...Response OK 2 STOP YOU HAVE COMPLETED THIS PROCEDURE 235 105 210 October 1999 Copyright 1999 Page 16 ...
Страница 676: ...235 105 210 October 1999 Copyright 1999 Page 9 ...
Страница 792: ...3 STOP YOU HAVE COMPLETED THIS PROCEDURE 235 105 210 October 1999 Copyright 1999 Page 9 ...
Страница 799: ...Figure 11 36 3 1 Cleaning Points 235 105 210 October 1999 Copyright 1999 Page 7 ...
Страница 801: ...235 105 210 October 1999 Copyright 1999 Page 9 ...
Страница 839: ...2 STOP YOU HAVE COMPLETED THIS PROCEDURE 235 105 210 October 1999 Copyright 1999 Page 16 ...
Страница 999: ...2 STOP YOU HAVE COMPLETED THIS PROCEDURE 235 105 210 October 1999 Copyright 1999 Page 13 ...
Страница 1008: ...Figure 11 55 1 CTSNS DIP Switch Settings 235 105 210 October 1999 Copyright 1999 Page 2 ...
Страница 1011: ...235 105 210 October 1999 Copyright 1999 Page 5 ...
Страница 1053: ...235 105 210 October 1999 Copyright 1999 Page 15 ...
Страница 1165: ...Procedure 14 14 RESERVED FOR FUTURE USE PROCEDURE 1 Reserved For future use 235 105 210 October 1999 Copyright 1999 Page 1 ...
Страница 1186: ...Procedure 14 17 RESERVED FOR FUTURE USE PROCEDURE 1 Reserved For future use 235 105 210 October 1999 Copyright 1999 Page 1 ...
Страница 1187: ...Procedure 14 18 RESERVED FOR FUTURE USE PROCEDURE 1 Reserved For future use 235 105 210 October 1999 Copyright 1999 Page 1 ...
Страница 1284: ...Figure 15 15 1 PARADYNE Paradyne Corporation 3810 Modem Diagnostic Control Panel 235 105 210 October 1999 Copyright 1999 Page 6 ...
Страница 1287: ...Figure 15 16 1 153A Adapter Connection Figure 15 16 2 AMATPS Block Diagram 235 105 210 October 1999 Copyright 1999 Page 3 ...
Страница 1289: ...Figure 15 17 2 AMATPS Data Link 235 105 210 October 1999 Copyright 1999 Page 2 ...
Страница 1290: ...Figure 15 17 3 Single Housing B25A Cable Assembly 235 105 210 October 1999 Copyright 1999 Page 3 ...
Страница 1292: ...235 105 210 October 1999 Copyright 1999 Page 5 ...
Страница 1294: ...Figure 15 17 8 201C to TN82 Data Set Cable Drawing 235 105 210 October 1999 Copyright 1999 Page 7 ...
Страница 1303: ...9 STOP YOU HAVE COMPLETED THIS PROCEDURE 235 105 210 October 1999 Copyright 1999 Page 2 ...
Страница 1324: ...11 Type and enter q 12 STOP YOU HAVE COMPLETED THIS PROCEDURE 235 105 210 October 1999 Copyright 1999 Page 2 ...
Страница 1342: ...Figure 15 40 1 SCANS II Dial Up Data Set Installation Diagram 235 105 210 October 1999 Copyright 1999 Page 2 ...
Страница 1344: ...Figure 15 40 4 59A1 Mounting Front in Slot J3 Figure 15 40 5 2048A Data Set Front 235 105 210 October 1999 Copyright 1999 Page 4 ...
Страница 1345: ...Figure 15 40 6 Berg Connector Terminations and Layout 235 105 210 October 1999 Copyright 1999 Page 5 ...
Страница 1346: ...Figure 15 40 7 B25A Cable 4 STOP YOU HAVE COMPLETED THIS PROCEDURE 235 105 210 October 1999 Copyright 1999 Page 6 ...
Страница 1360: ...Figure 15 47 2 Typical SCANS III Link Diagram 235 105 210 October 1999 Copyright 1999 Page 2 ...
Страница 1368: ...Response FA or OK appears 17 STOP YOU HAVE COMPLETED THIS PROCEDURE 235 105 210 October 1999 Copyright 1999 Page 2 ...
Страница 1372: ...235 105 210 October 1999 Copyright 1999 Page 2 ...
Страница 1374: ...235 105 210 October 1999 Copyright 1999 Page 4 ...
Страница 1376: ...Figure 15 55 6 201C to TN83 Data Set Cable Drawing 235 105 210 October 1999 Copyright 1999 Page 6 ...
Страница 1418: ...Figure 15 56 1 PARADYNE 3810 Modem Diagnostic Control Panel 235 105 210 October 1999 Copyright 1999 Page 4 ...
Страница 1421: ...Table 1 1 O M Checklist 235 105 210 October 1999 Copyright 1999 Page 3 ...