SCF Reference Manual for J-Series and H-Series RVUs

Using SCF to Configure and Manage NonStop
Integrity NS-Series Servers
SCF Reference Manual for J-Series and H-Series RVUs529649-003
1-13
File Security
enclosure, can increment the
xx
value. A minor change, like the addition of a tape
drive, can increment the
yy
value.
Managing multiple versions of the operating system in this way results in fewer SYS
nn
subvolumes. This in turn reduces the disk space requirements on the $SYSTEM disk,
because you now need to create a new SYS
nn
subvolume only when you load a new
version of the operating system.
Storing multiple hardware configurations on the ZSYSCONF subvolume, independent
of the SYS
nn
subvolume, also means that you need to configure the system fewer
times. For example:
You can switch RVUs by loading the system from a different SYS
nn
subvolume,
yet continue to use the same hardware CONFIG file.
You can switch between hardware configurations by loading the system from
different system configuration files.
File Security
SCF has sensitive commands that are available only to super-group users (255,
n
),
such as ADD, ALTER, DELETE, START, and STOP. (Any user can use the
nonsensitive commands, such as INFO and SETPROMPT.) For the lists of sensitive
and nonsensitive SCF commands, see page 5-15.
Standard file-system security restricts access to a saved system configuration file
based on its file security attributes.
The owner of a generic process can also issue sensitive commands to it. Generic
processes are described in the
SCF Reference Manual for the Kernel Subsystem
.
Performing Online Configuration Changes on a Remote System
To install a new RVU or make a major system configuration change on another system
in the network, you create an SCF command file on the local system for the new
remote configuration. Doing this has no impact on the performance of the current
running system. If you want, you can test the new configuration on a stand-alone test
system. Then you implement the new configuration by moving the command file to the
remote system, loading that system, and running SCF with the command file as input.
Caution. Do not change the security of the current CONFIG file. $ZCNF has exclusive
access to this file.