Introduction to NonStop Operations Management
Security Management
Introduction to NonStop Operations Management–125507
9-8
Authentication Services Provided by the Tandem
NonStop Kernel
Authentication Services Provided by the Tandem NonStop Kernel
The Tandem NonStop Kernel operating system has built-in security that uses passwords
for authentication and security strings to control access to files. Utilities, including the
File Utility Program (FUP) and the Disk Space Analysis Program (DSAP), help you
control and monitor system security.
The Tandem NonStop Kernel operating system provides both local and network security.
Network security default settings are more restrictive than local system security defaults.
For more comprehensive security, the Safeguard product should be used with the
operating system.
Safeguard
The Safeguard product extends the access-control features of the operating system,
thereby allowing security administrators to easily tailor the level of protection to suit
their needs. The Safeguard product augments the operating system security features by:
•
Providing more control over the logon process
•
Allowing detailed specifications of user access privileges
•
Extending access control to operating system resources such as disk volumes,
printers, communication lines, and processes
•
Auditing attempts to:
•
Log on
•
Change user records
•
Access system objects
•
Change protection records for system objects
The Tandem NonStop Kernel operating system with the Safeguard product allows you
to:
•
Specify the users who are allowed to create and manage user profiles
•
Control access to resources, and audit attempts to access resources
•
Control all file creation on any disk volume or subvolume on the network, and audit
all attempts to create files
•
Control creation of NonStop SQL/MP tables, views, indexes, and catalogs on any
disk volume and subvolume on the network
•
Control creation or deletion of any named process, and audit all process creation and
deletion attempts
•
Audit changes made to the security database
•
Comply with many government computer security standards including those of the:
•
United States (NCSC and Treasury), C2 level