Fitzgerald & Long Sentry User Manual

Hewlett-packard user manual printer printer

Advertisement

Quick Links

SENTRY
The Integrated Security System
Release 4
User Guide
Fitzgerald & Long
12341 E. Cornell Avenue, #18
Aurora, Colorado 80014-3323 USA
Phone: (303) 755-1102
FAX: (303) 755-1703

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the Sentry and is the answer not in the manual?

Questions and answers

Summary of Contents for Fitzgerald & Long Sentry

  • Page 1 SENTRY The Integrated Security System Release 4 User Guide Fitzgerald & Long 12341 E. Cornell Avenue, #18 Aurora, Colorado 80014-3323 USA Phone: (303) 755-1102 FAX: (303) 755-1703...
  • Page 2 NOTICE The information contained in this guide is subject to change without notice. Fitzgerald & Long, Inc. shall not be liable for technical or editorial omissions made herein; nor for incidental or consequential damages resulting from the furnishing, performance, or use of this material. This guide contains information protected by copyright.
  • Page 3: Table Of Contents

    Subroutine: SENTRY.USER.ITEM.CONTROL------------------------------------------------- Appendix - 3 Subroutine: SENTRY.VIOLATION.STAMP----------------------------------------------------- Appendix - 6 APPENDIX 2 ------------------------------------------------------------------------------------------ Appendix 2 - 1 SENTRY KEY BINDINGS ------------------------------------------------------------------------ Appendix 2 - 1 Table Of Contents AND VALIDATION MENU----------- 1 - 1 MAINTENANCE MENU -------------------------------- 2 - 1...
  • Page 5: Using This Guide

    SENTRY User’ s Guide USING THIS GUIDE The SENTRY User's Guide is comprehensive in its descriptions of all of SENTRY's menus, data entry screens and reports. The Guide follows the same structure as the SENTRY menu system. There are four major sections in SENTRY. These are: 1.
  • Page 6 Introduction - 2 SENTRY User’ s Guide PI/open the command prompt is indicated by a colon “:” while for uniVerse the prompt is a greater-than sign “>”. Fitzgerald & Long...
  • Page 7: Using The Screens

    DEPARTMENT = “MIS” USER.NAME HELP Enter the word HELP at any input prompt in SENTRY. A HELP screen will be displayed containing a brief explanation of the expected input and syntax where appropriate. Press <RETURN> to exit the HELP screen.
  • Page 8 When you wish to delete the data in a field and make the field null, address the field using the appropriate line number, then enter a space followed by <RETURN>. A blank (null) field will be displayed. Fitzgerald & Long SENTRY User’ s Guide No data appearing on the...
  • Page 9: Installing Sentry

    INSTALL SENTRY. Be safe, call us for assistance and instruction on installation. We want to help. SENTRY will require approximately 5 to 10 MB of disk space in one filesystem on your computer. This is an estimate. The actual size will vary depending on the number of files on your system and the cross referencing for those files.
  • Page 10 9. Now enter the command "SENTRY". You will see a copyright screen which identifies your company and computer system. If there are discrepancies in the data on this screen, please contact us. SENTRY is licensed only for use at the company and on the system described on the copyright screen.
  • Page 11 4. Utilities Menu Please select one of the above: Figure 1 - Main Menu 11. At this point you are ready to begin loading your data into the SENTRY database. This procedure is described in the following section “Getting Started”. Main Menu 07 AUG 2000 Fitzgerald &...
  • Page 12: Getting Started

    TCL in another account use the TCL “LOGTO” command. Since SENTRY is a security product, it won’ t allow just any user to use it to modify your system! Only users whose UNIX UID is 0 (zero) will be permitted to enter SENTRY. Users with the UID of 0 are referred to as “super users”...
  • Page 13 Figure 3 - This screen is displayed immediately after the copyright screen in the previous figure. You will see the second line “You must be super user to use SENTRY” only if your user ID has a UID other than 0 (zero).
  • Page 14 Introduction - 10 This is a safety precaution. SENTRY is a very powerful tool and should only be used by the System Administrator or his designee. SENTRY is designed to be a single user utility. Therefore, only one user at a time is allowed into SENTRY.
  • Page 15 Reports Menu will print a variety of useful reports which will allow you to view the data you have collected. The Utilities Menu contains a number of tools which will occasionally be useful. Complete documentation for each menu and selection in SENTRY is contained in the next sections of this User Guide.
  • Page 16: Introducing The Main Menu

    4. Utilities Menu Please select one of the above: 1 Figure 4 - This is an example of SENTRY’ s Main Menu which provides access to the four submenus and divides SENTRY into four logical sections. These four selections outline the four logical divisions of SENTRY. Each division is a collection of programs which perform related tasks.
  • Page 17 The third selection on SENTRY's Main Menu invokes the Reports Menu. This submenu provides access to reports. These reports describe all aspects of the SENTRY database from the perspectives of system, users, groups, permissions, access violations and SENTRY protected database commands.
  • Page 19: Introducing The Database Creation And Validation Menu

    1. INTRODUCING THE DATABASE CREATION AND VALIDATION MENU The first selection of SENTRY's Main Menu is Database Creation and Validation. This menu provides access to programs which will build SENTRY’ s database from your existing user, group and file system data. SENTRY 1.
  • Page 20: Database Creation And Valudation Menu

    1.0 DATABASE CREATION AND VALUDATION MENU This is the first submenu accessible from SENTRY's Main Menu. It is also the first selection you will make after installing SENTRY. Through this menu, you will execute programs which load all the UNIX passwd and group information on your system into SENTRY's database.
  • Page 21 SENTRY User’ s Guide Section 1 - 3 Fitzgerald & Long...
  • Page 22: Upload User And Group Profiles From Unix

    Figure 7 - This is an example of the “SENTRY Database Load” screen. Enter “OK” to execute the program. This is the first program you will execute after SENTRY is installed. After the initial upload you will use this program on a regular basis to insure that SENTRY is consistent with your UNIX files.
  • Page 23 Because every site is unique, please discuss your system requirements with us if you are undecided about the frequency with which you should be uploading (recreating) the SENTRY database. The program that loads the UNIX passwd and group data into SENTRY can be run outside SENTRY’ s menu system, in “batch” mode.
  • Page 24: Create Database From File System

    To execute as a background job enter: PHANTOM SENTRY.FILE.LOAD (BATCH) You must be in the “sentry” directory to execute this job. Therefore, if you plan to use cron, the cron process must “cd” into the “sentry” directory BEFORE executing the command.
  • Page 25: Validate The User Profile Database

    This program is used to check the consistency of the users, groups and permissions which have been loaded into the SENTRY database via the first two programs described in this section. user IDs, groups, and their usage in the file system are analyzed and inconsistencies are reported. For example, the validation report might point out a file whose owner is not registered or a home pathname which does not exist on the system.
  • Page 26 SENTRY. Others choose to have users manage their own passwords and not to maintain them in SENTRY. If you are not tracking user passwords, the “missing password” messages will be of little use to you.
  • Page 27 6. “Group XXXXX is not on the SENTRY.GROUPS file.” - A Group name was found in SENTRY’ s control list which does not exist in the SENTRY.GROUPS file. This indicates that one of SENTRY’ s database files is damaged and should be rebuilt. Upload the passwd and group files to fix this problem.
  • Page 28 “/ZZZZZ”. However, the group does not exist in SENTRY. Possibly, the group once existed but has been deleted. The group for this disk object should be replaced with a valid group on the system. Alternatively, a new or existing group could be assigned the same group number (GID).
  • Page 29 SENTRY User’ s Guide Section 1 - 11 Fitzgerald & Long...
  • Page 31: Introducing The Database Maintenance Menu

    Through the data entry programs you may quickly access an unwanted group and remove all references to it. When SENTRY is used to remove a user ID, references to that ID are removed. SENTRY provides the maintenance link between the file system permissions, the passwd file and the group file.
  • Page 32: Database Maintenance

    Section 2 - 2 2.0 DATABASE MAINTENANCE This is the second sub-menu accessible from SENTRY’ s Main Menu. It is the menu you will use to make changes to the SENTRY database. You may create or modify users, groups and permissions through this menu.
  • Page 33 6. User Defined Items. This is a special SENTRY feature which allows you to define SENTRY security objects. These objects may be accessed through subroutine calls to solve unique security problems which may not be met through permissions and VOC item security facilities.
  • Page 34: System Profile Maintenance

    System Profile from the secondary Maintenance Menu. When this program is executed, the profile data will be read from the SENTRY database and displayed in the appropriate fields. There are 18 items defined on this screen. A detailed description of the data entry screen and prompts follows.
  • Page 35 SENTRY data entry programs you will be REQUIRED to enter a password for the user or allow SENTRY to generate one for you if this field is set to “N”. This is not a UNIX parameter.
  • Page 36 “LC”. This parameter is intended to assist System Administrators who wish to be consistent in their usage of case when creating users and groups. If you do not want SENTRY to alter the case for users and groups set this field to “LIT” (literal). SENTRY will not alter the characters you have entered. The default and recommended value for this field is “LC”...
  • Page 37 “wtmp” which contains a log of user logins. The UNIX accounting feature which updates “wtmp” may be turned on and off. SENTRY has no way of knowing if accounting is turned on or not, so it looks for recent activity in the “wtmp” file. If no activity is found in the file during the last number of days specified in this parameter, SENTRY assumes that accounting is turned off and doesn’...
  • Page 38: Custom.user

    Figure 13 - This is an example of the ”Custom User Default Maintenance” data entry screen. To execute this program, enter “1” System Profile Maintenance from the Main Sentry menu, after recalling an exiting user or entering a new user you may enter “C” at the bottom prompt. Entering “C” invokes this program.
  • Page 39 SENTRY User’ s Guide Section 2 - 9 1. Minimum password change (days): Enter the number of days before a user is allowed to change his existing password. For example, if UNIX has just expired a users password and the user enters a new one, you can use this parameter to prevent the user from resetting his password to the old one for the number of days you specify.
  • Page 40: User Maintenance

    Payroll department, get his name and telephone number and call to inquire what process he is executing. To execute this program, select 2. Database Maintenance Menu from SENTRY’ s Main Menu; then, select 2. User Maintenance from the Database Maintenance Menu. The User Maintenance program will be invoked.
  • Page 41 Section 2 - 11 SENTRY database using the user’ s name, enter “@” followed by the first or last name of the user. For example, if you wanted to search for user IDs for Peggy Long, you could enter “@long”. If there were more than one “long”...
  • Page 42 “pick” list. The name of the group will display in parentheses to the right of the file. If you enter an “N” SENTRY assumes that you wish to create a new group. The next available GID will be assigned and you will be prompted to provide a Group Name.
  • Page 43 Figure 15 - This is an example of the ”Custom User Data Maintenance” data entry screen. To execute this program, enter “2.” User Maintenance from the Main Sentry menu, after recalling an exiting user or entering a new user you may enter “C” at the bottom prompt. Entering “C” invokes this program.
  • Page 44 (where the user was a file owner) and later reassign that old user’ s UID to a new user. It is possible that the new user would then have access to files he should not be allowed to use. SENTRY will notify the System Administrator of this issue when a user ID is deleted.
  • Page 45 (Figure 16). Enter “A” to view this list. In the following screen note that SENTRY displays a list of all files owned by this user. This is a scrolling window if there are more files than can be displayed on one screen. User “F” or “B” to scroll forward or backward.
  • Page 46 File System maintenance screen. To select this global change option, enter “C”. SENTRY will display the file pathname and it’ s progress through the list of files. Here is a sample of the screen SENTRY displays when this choice is invoked (Figure 19).
  • Page 47 In summary, the User Maintenance screen allows you to create new users, modify existing users and delete users. Remember that file ownership is linked to users via the UID. SENTRY will advise you when deleting a user will cause a file to have an “unregistered” owner.
  • Page 48: Group Maintenance

    GID for a user or a supplementary group. To execute this program, select 2. Database Maintenance Menu from the SENTRY main menu then select 3. Group Maintenance from the Database Maintenance Menu. This program will be invoked.
  • Page 49 If you have only changed or added a description, this is not stored in the UNIX file and there is no need to update UNIX. Entering “DIS” will cause SENTRY to display a list of users who are members of the group which you have retrieved from the SENTRY database. SENTRY will display the following screen.
  • Page 50 It is possible the users in the new group would then have access to files they should not be allowed to use. SENTRY will notify the System Administrator of this issue when a group is deleted.
  • Page 51 File System maintenance screen. To select this global change option enter “C”. SENTRY will display the file pathnames and its progress through the list of files. Here is a sample of the screen SENTRY displays when this choice is invoked (Figure 25).
  • Page 52 Section 2 - 22 SENTRY User’ s Guide D) Do not delete this group. This option allows the user to return to the main Group Maintenance menu without altering the group or the file system. No changes are made. To select this option enter “D”.
  • Page 53: File System

    With this program you may change owners, groups and the permissions for any file or directory in your file system. With Sentry’ s extensive B-tree system of cross references, you may use this program to locate the path to any object on your system.
  • Page 54 Note the “d” to the left of the permissions string defines which entries are directories. Next enter “EXP”. SENTRY will repaint the screen displaying the contents of the targeted subdirectory. To move from a subdirectory to one level “up” use “I”mplode.
  • Page 55 /usr/spool/cron/crontabs/peggy bottom Figure 28 - This is an example of the cross reference list SENTRY provides through the General File Utility screen. To invoke the cross reference function, enter “@”. From the cross reference display, you may choose many of the standard commands. For example, to go to the directory containing one of the displayed files, position to that line and enter “I”...
  • Page 56 If the file is not a standard UNIX type SENTRY will report it as “Unknown File Type”. In the right top half of the screen SENTRY displays the I-node number and the number of links plus three date/time stamps. The following paragraphs are quoted from UNIX documentation for these three dates.
  • Page 57 1. Owner - SENTRY displays the UID of the file owner plus the user ID (may be more than one) for the displayed UID. To change the owner, enter “1” followed by <RETURN>. You will be prompted “Enter the user to be the file owner”.
  • Page 58: Acls Maintenance

    There are not defaults (as there were with ACL implementation on the Prime). Sentry provides a data entry screen to allow you to create and modify ACLs. To access this data entry screen, invoke the second selection from the Main Menu, “2. Database Maintenance Menu”. For the Database Maintenance Menu select number four "4.
  • Page 59 To change the owner of this file enter the field number (which is located to the left of the field label) “1” followed by <ENTER>. Sentry will then prompt you at the bottom of the screen “Enter user to be the file owner.”...
  • Page 60 Section 2 - 30 SENTRY User’ s Guide Fitzgerald & Long...
  • Page 61: More File Manager Views

    These are the rights available to this user for each item displayed. SENTRY will evaluate the owner and group to determine if either set of permissions apply to this user. If Fitzgerald & Long...
  • Page 62 Fitzgerald & Long SENTRY User’ s Guide 14:34:37 18 AUG 2000 (32 entries.) .elm .profile .profile.orig .rhosts .sh_history .ustk_root .uvhome IDMERROR.console IDMERROR.pty-ttyp3 Mail SYSBCKUP exl_usr hp-ux...
  • Page 63 SENTRY User’ s Guide FILE.MANAGER Path : / Access shown for group piadm (9) top... --> drwx------ -r--r--r-- -r--r--r-- -rw------- -rw-rw-rw- -rw-rw-rw- -r--r--r-- -rw-rw---- -rw-rw---- drwx------ -rwxr-xr-x drwxr-xr-x drwxr-xr-x drwxr-xr-x drwxr-xr-x -rwxr-xr-x -rwx-----x Enter the group name or GID to view (@ for X-ref).piadm Figure 31 - This is an example of the permissions in force for group “piadm”.
  • Page 64: Command Maintenance

    2.5 COMMAND MAINTENANCE This program is used to update protection of VOC items in uniVerse, PI/open and UniData accounts. It is also a convenient means of reviewing the existing protection (created by SENTRY) which may be in effect. COMMAND.MAINT Account Name : /usr/sentry.dev VOC Command 1.
  • Page 65 Account Name - Enter the full pathname for the account containing the VOC item you wish to protect. SENTRY will search for the account. If it is not found on the disk, you will be prompted to re-enter the account name. This field is NOT cross referenced.
  • Page 66 4. Users - Enter the user ID for which you wish to define protection rights. The user ID must already exist on the SENTRY database. Type “@ name” for a listing of all user IDs having “name” in their user name.
  • Page 67 <RETURN> will position you at the Account Name prompt. A <RETURN> at this prompt will cause SENTRY to return to the Database Maintenance Menu. Enter Line # of Groups (or Users) (1-N), "A"dd, "F"orward or "B"ack Page: - When using the Groups or Users windows, you will see the prompt “Enter line # of Group (or User) (1-n) or (A)dd”.
  • Page 68: User Item Protection Maintenance

    Section 2 - 38 2.6 USER ITEM PROTECTION MAINTENANCE This is a special SENTRY feature which allows you to define SENTRY security objects. These objects may be accessed through subroutine calls to solve unique security problems which may not be met through permissions and VOC item security facilities.
  • Page 69 VOC in the account where users will be executing the call. If you wish to use an account other than SENTRY you must first create a file in the desired account called "SENTRY.USER.ITEMS". SENTRY will search this file first (if it exists) for your User Item.
  • Page 70 ID simply type over the existing entry. 4. User Rights - If you enter a new user ID (which is not in the current list) in this screen, SENTRY will prompt you for the rights. Enter the access rights for the user. Rights must be specified for each user named.
  • Page 71 SENTRY User’ s Guide Section 2 - 41 To save changes you have made to the User Items, enter "F" to file. After filing or deleting a User Item, the screen will be repainted and you will be prompted for a User Item name. To enter another Account Name press <RETURN>.
  • Page 72 Section 2 - 42 SENTRY User’ s Guide Enter Line # of Groups (or Users) (1-N), "A"dd, "F"orward or "B"ack Page: - When using the Groups or Users windows, you will see the prompt "Enter line # of Groups (or Users) (1-n) or "A"dd. If there are more than five entries in a window, "F"orward page or "B"ack page will be appended to this...
  • Page 73: Introducing The Reports Menu

    SENTRY Command and User Item protection. Although system wide reports for users, groups, and permissions are not readily available through UNIX, SENTRY provides reports from several perspectives; showing all users, groups, and their relationships. Additionally, SENTRY's Command Protection entries are also reported.
  • Page 74: Reports Menu

    Figure 35 - All reports are executed through this report menu Through these selections you may print comprehensive reports describing your system's users, groups, and their relationships, plus the SENTRY Command Protection reports (selections 4 and 5). The first selection is System Profile.
  • Page 75 A list of accounts where that command is protected is displayed. Choosing selection six, Access Violations, prints the SENTRY Violations Log. Entries are printed in chronological order. Each record includes date, time, port number, USER ID, pathname and the protected command which was executed creating the violation.
  • Page 76: System Profile Report

    SENTRY data entry programs you will be REQUIRED to enter a password for the user or allow SENTRY to generate one for you if this field is set to “N”. This is not a UNIX parameter. It is used only by SENTRY.
  • Page 77 Password Format Mask - This field is used by the User Profile data entry screen if you use SENTRY’ s generate new password option in the password field. If you plan to use this functionality you may select a “mask” of either ALPHA or ALPHANUM which generates either alphabetic or alphanumeric passwords.
  • Page 78 “LC”. This parameter is intended to assist System Administrators who wish to be consistent in their usage of case when creating users and groups. If you do not want SENTRY to alter the case for users and groups, set this field to “LIT” (literal). SENTRY will not alter the characters you have entered. The default and recommended value for this field is “LC”...
  • Page 79 ID. Most UNIX systems allow up to 8 alphanumeric characters. This field is used by the User Profile data entry screen to limit the length of user IDs created through SENTRY’ s data entry screen. The recommended and default value is 8.
  • Page 80 Special characters such as “.” and “-” or “_” are used in file or directory names to make a compound name more readable. SENTRY’ s B-trees will use the set of characters defined here to break out the components of a compound name such as “payroll.ledger”. This file would be indexed on the word “payroll”...
  • Page 81: User Profiles

    SENTRY User’ s Guide 3.2 USER PROFILES The SENTRY User Profile Report displays all parameters in effect for each user registered in your system. Additionally such information as the users name, department and telephone may be added to the system data.
  • Page 82 This report was created by the reporting language in your database system. The paragraph which generated this report is VOCLIB/SENTRY.USERS.REPORT. The data file used is SENTRY.USERS. In addition to the data displayed here you may create a report which displays the last login date and time.
  • Page 83: Groups Report

    3.3 GROUPS REPORT The SENTRY Groups Report displays, in a very concise format, all data related to groups on your system. Along with the name and description of each group are all user IDs associated with the group. The user’ s relationship with each group (GID or supplementary) is reported also.
  • Page 84 Description - This is a free form text field to be used by the System Administrator to document the usage of groups on your UNIX system. This report is produced by the database reporting language on your system. The paragraph can be found in VOCLIB/SENTRY.GROUPS.REPORT. The database file is SENTRY.GROUPS. Fitzgerald & Long...
  • Page 85: Account Protection Report

    SENTRY User’ s Guide 3.4 ACCOUNT PROTECTION REPORT This is a report of all protected commands on your system. It is sorted by account such that there is one page per account printed. Note that the account pathname appears in the title of the report.
  • Page 86 Section 3 - 14 SENTRY User’ s Guide Description - The description field is used for documentation and may be entered through the Database Maintenance program for Database Commands. Group Name & Rights - This field displays the names of groups (if any) used to define the access to this command and the rights given to these groups.
  • Page 87: Command Protection Report

    SENTRY User’ s Guide 3.5 COMMAND PROTECTION REPORT The SENTRY Command Protection Report presents an alphabetical listing of all commands protected through SENTRY's Database Commands program. SENTRY.COMMANDS.REPORT Commands: Verbs, Sent, Menu, PA or PQ Type Description ============== ==== ================= DELETE...
  • Page 88 System Administrator in the data entry screen for Command Maintenance. This report is written in the database reporting language used by your system. The paragraph which generates this report is sentry/VOCLIB/SENTRY.COMMANDS.REPORT. The database file is SENTRY.COMMANDS.
  • Page 89: Access Violations Report

    01:55PM One record listed. Figure 41 - This is a sample report of the SENTRY Violations Log. Each attempt to use a restricted command by an unauthorized user is reported. Each attempt to use a restricted command is logged in SENTRY's violation log and may also be displayed at the system console if desired.
  • Page 90 Messages beginning with "PERFORM Command" indicate that use of the Protected Command occurred at the database prompt. In addition to the standard SENTRY reports, we encourage you to use the database reporting language to create custom reports or to perform inquiries (e.g. LIST SENTRY.VIOLATIONS WITH DATE AFTER "01/01/95"...
  • Page 91: Introducing The Utilities Menu

    Profile for length and format. A special report is available to assist the System Administrator in notifying users of the changes. Should SENTRY’ s cross reference files become damaged, you can easily rebuild them through this menu. Additionally, we have provided a utility to “re-install” SENTRY’ s command protection on an account.
  • Page 92: Utilities Menu

    This menu provides access to five utility programs designed to save the System Administrator data entry effort and time in performing global tasks such as generating and protecting an account "like" another account, purging the Violations Log on a selective basis, and changing passwords in SENTRY's database.
  • Page 93 Selection five, Update Protected Commands to Account VOC Files. It is possible that through the use of the editor or upgrading to a new release that Sentry’ s Command Protection could be overwritten. To re-install the Command Protection into the VOC of an account, use this program.
  • Page 94: Voc Protection Setup

    VOC protection without the necessity of entering each item in a number of accounts. To invoke this program enter 4, Utilities Menu, from the SENTRY Main Menu; then, select 1, Protect a Database Account Like an Account Already Protected.
  • Page 95: Puging The Violations Log

    SENTRY User’ s Guide 4.2 PUGING THE VIOLATIONS LOG This program provides a convenient method of selectively purging the SENTRY Violations Log. You may purge by record key, dates, ports, USER ID, or account name. To invoke this program enter 4, Utilities Menu, from the SENTRY Main Menu;...
  • Page 96 Section 4 - 6 SENTRY User’ s Guide This program is constructing a query sentence to SELECT the items to be purged. When entering your criteria, think of it as though you were completing the phrase "WITH field.name EQ (or LT, GT)" to the items you enter.
  • Page 97: Password Creation

    2. user IDs - Enter a list of user IDs separated by spaces for which you would like to generate new passwords. The new passwords are written into the SENTRY.USERS file in an encrypted format. The System Administrator may access these passwords through the Sentry Users Maintenance screen.
  • Page 98 Section 4 - 8 SENTRY User’ s Guide MM/DD/YY. Sentry will select all users whose password update date is earlier than this date. If there is no date in this field, the record will not be selected. Fitzgerald & Long...
  • Page 99 SENTRY.GROUPS file. 6. User Names - Sentry maintains a cross reference list by the user’ s name as entered into the Sentry Users data entry program. If you have used this field in your data entry, you may use it in this program to select by user name instead of by user ID (selection criteria 2).
  • Page 100: Rebuild Cross Reference Files

    4.4 REBUILD CROSS REFERENCE FILES SENTRY maintains a number of traditional inverted lists which are used for cross referencing. When you use the “@” function you are accessing one of these lists. Should you encounter a list where an item appears as “NOT FOUND”...
  • Page 101: Update Protected Commands

    Once you have entered the pathname to the account SENTRY will validate the pathname and ask if you are ready to continue with the updates. To continue with the updates enter “OK”. Enter <ESC> to abort this program.
  • Page 103: Sentry Internal Subroutines

    "accidents" which might cause data corruption we must remind you that you are fully responsible! Be careful ..practice safe computing. All subroutines are catalogued globally as "*SENTRY...". We recommend the following example of BASIC syntax as the preferred technique for calling the SENTRY Subroutines SENTRY.USER.ITEM.CONTROL="*SENTRY.USER.ITEM.CONTROL"...
  • Page 104: Data Encryption

    There are an almost infinite number of encryption techniques. SENTRY uses a method which can be classified as "private key encryption". The encryption subroutine is SENTRY.ENCRYPT. The subroutine has three arguments -- DATA.STRING, RETURN.STRING and ENCRYPTION.KEY.
  • Page 105: Subroutine: Sentry.user.item.control

    It's POWERFUL and potentially dangerous. Subroutine: SENTRY.USER.ITEM.CONTROL SENTRY.USER.ITEM.CONTROL is a subroutine used to determine access rights of a user ID to items defined by the user with the SENTRY User Item Maintenance Screen (Section 2-6).
  • Page 106 /usr/sentry/SENTRY.USER.ITEMS. If the item is found in either step 1 or 2, the value will be 1. If the SENTRY.USER.ITEMS file in the SENTRY account cannot be accessed or the item is not found in either step 1 or step 2, the value returned will be 0.
  • Page 107 SENTRY User’ s Guide Appendix 1 - 5 If an error was encountered by the subroutine, an error message will be returned. If no error occurred ERROR.TEXT will be null. Fitzgerald & Long...
  • Page 108: Subroutine: Sentry.violation.stamp

    Free format text description of the violation. This is a routine similar to the one which logs violations to the SENTRY Violations Log when a user with insufficient rights attempts to use a SENTRY protected command. It will create a new entry in the SENTRY.VIOLATIONS.LOG file.
  • Page 109 SENTRY User’ s Guide Appendix 1 - 7 Fitzgerald & Long...
  • Page 111 <escape> character followed by <return>. This may create a conflict for sites using certain communications packages. By modifying the KEY.BINDINGS record, the user may customize his version of SENTRY to use whatever series of keystrokes is desired for each of the functions.
  • Page 112 Appendix 2 - 2 SENTRY User’ s Guide environment and reenter SENTRY in order for the changes to take effect because these variables are read into named COMMON. NOTE: DO NOT enter the quote marks. Fitzgerald & Long...
  • Page 113 SENTRY User’ s Guide Appendix 2 - 3 Fitzgerald & Long...

Table of Contents