Disk-file security, Setting file security, Table 16-3 – HP NonStop G-Series User Manual
Page 335: Types of file access, Table 16-4, Levels of disk-file security
![background image](/manuals/396922/335/background.png)
Managing Users and Security
Guardian User’s Guide — 425266-001
16 -13
Disk-File Security
Disk-File Security
Each disk file has an owner and a file security. When you create a file, you are its
owner, and the file ownership is identified as your user ID. You remain the owner of the
file unless you, your group manager, or a super ID user (255, 255) delete it or transfer its
ownership to another user. As the file owner, you can secure the file with the File Utility
Program (FUP) to prevent unauthorized users from accessing it.
When you create a file, your default logon security is automatically assigned to any file
you create during a TACL session. To determine your default security, use the TACL
WHO command. Unless you specify a different security for a file, all files that you
create will have this default security.
Setting File Security
The four types of access for a disk file are read, write, execute, and purge (RWEP):
You set file security with the FUP SECURE command. You set your default security
attributes with the TACL DEFAULT command or TACL VOLUME command.
DEFAULT sets the logon (or saved) attributes, while VOLUME temporarily sets the
attributes.
Table 16-3. Types of File Access
Access
Definition
Read
Lets a file be read or copied, and lets a command file be executed using the
TACL OBEY command.
Write
Lets a file be modified.
Execute
Lets a file be executed as a process using the TACL RUN command (applies to
program files with file code 100).
Purge
Lets a file be deleted or renamed, or to have its definition altered.
Table 16-4. Levels of Disk-File Security
FUP Code
Program Value
Access
–
7
Local super ID only
U
6
Local or remote owner (any user with the owner’s user ID)
C
5
Local or remote member of the owner’s group (any member
of the owner’s community)
N
4
Any local or remote user
O
2
Local owner only
G
1
Local member of the owner’s group
A
0
Any local user
Local refers to access within a single system; remote refers to access between systems (or nodes) in a network.