Safeguard Reference Manual (G06.24+, H06.03+ )

Contents
Safeguard Reference Manual520618-013
ii
1. Introduction (continued)
1. Introduction (continued)
Unauthenticated User 1-9
Local Request 1-9
Remote Request 1-9
Interaction of Local and Remote Users and Requests 1-9
Components of the Safeguard Subsystem 1-10
Who Can Use SAFECOM Commands 1-10
Abbreviating SAFECOM Commands 1-13
The Super ID 1-13
2. Common SAFECOM Language Elements
Wild-Card Characters 2-1
Object Names 2-3
Specifying Disk-File Names 2-4
Fully Qualified Disk-File Names 2-4
Examples 2-5
Partially Qualified Disk-File Names 2-5
Examples 2-6
File-Name Lists 2-6
Examples 2-6
Patterns 2-7
Specifying Disk Volume Names 2-7
Fully Qualified Volume Names 2-7
Examples 2-7
Partially Qualified Volume Names 2-7
Examples 2-8
Volume Name Lists 2-8
Examples 2-8
Specifying Subvolume Names 2-8
Fully Qualified Subvolume Names 2-8
Examples 2-9
Partially Qualified Subvolume Names 2-9
Examples 2-9
Subvolume Name Lists 2-9
Examples 2-9
Specifying Device Names 2-10
Fully Qualified Device Names 2-10
Examples 2-10
Partially Qualified Device Names 2-10