Security; Naming Guidelines For Applications; Table 3-9. Restricted Commands And Objects For Pathway/Its - HP NonStop Pathway/iTS Programming Manual

Management programming manual
Table of Contents

Advertisement

SPI Programming Considerations

Security

The owner of the user ID that starts the PATHMON process can set the ZOWNER and
ZSECURITY fields in ZPWY-DDL-DEF-PATHWAY during the execution of a START
PATHWAY command to restrict the use of a specific group of commands. Commands
included in this restricted group are those that can directly alter the state of an object.
Table 3-9
lists the restricted commands and their object types.

Table 3-9. Restricted Commands and Objects for Pathway/iTS

To Control...
TCP objects
TERM objects
PROG objects
Tell Messages
Any user can issue all of the other commands.

Naming Guidelines for Applications

By convention, HP uses names beginning with the letter Z (lowercase z in the C
language) for all definitions and all component fields of structures in its definition files
on NonStop systems. To avoid conflicts with names defined by HP, it is best not to
begin any of your own names with uppercase or lowercase Z.
NonStop Pathway/iTS Management Programming Manual—426749-002
Use These Restricted (Sensitive)
Commands (ZPWY-CMD- ) and Object Types (ZPWY-OBJ- )...
ADD
ALTER
CONTROL
REFRESHCODE
STOP
SWITCH
ABORT
ADD
ALTER
DELETE
INSPECT
RESUME
START
STOP
SUSPEND
ADD
ALTER
DELETE
ADD
DELETE
START
TELL
TCP
TCP
TCP
TCP
TCP
TCP
TERM
TERM
TERM
TERM
TERM
TERM
TERM
TERM
TERM
PROG
PROGTERM
PROG
PROGTERM
PROG
PROGTERM
TELL
TELL
TELL
TELL
3- 31
Security

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents