User`s guide

Setting up Meridian Mail security 6-75
Password control
Standard 1.0 System Administration Guide January 1998
Password control
Introduction
Hackers have been known to access a system to obtain printouts
of valid authorization codes, reassign control characteristics,
defeat security measures in place, or degrade system
performance. By controlling system passwords, you can
minimize unauthorized access to the system. You can define a
number of passwords that administrators can use to access the
system for the purpose of the database.
Two types of
passwords
As of X11 Release 16, two types of passwords allow access to
all aspects of the database and maintenance programs:
Level 1 password
Level 2 password
Level 1 password
You can use the Level 1 password to log on to the switch. Upon
entering the valid password, you can change virtually all aspects
of the database with the exception of changing the Level 1 and 2
passwords and, if defined, the secure data password associated
with assigning authorization codes and DISA parameters.
Implementing and
auditing the Level 1
password
Use the following table to determine which overlays and
prompts should be used to implement or audit the Level 1
password.
For Implement using Print using
Configuration LD 17—PWD2, NPW1 LD 22 by PWD