NET/MASTER RMS Management and Operations Guide
Implementing the Security Exit NCL Procedure to Control Access
Planning for, Installing, and Managing RMS
115415 NonStop NET/MASTER RMS Management and Operations Guide 3–9
Implementing the
Security Exit NCL
Procedure to Control
Access
RMS uses the NCL procedure ZRMSSECN to control user access to its functions. If
you do not want to control access to RMS functions, leave the NCL procedure
ZRMSSECN as is. To control access to RMS functions, customize the NCL procedure.
RMS passes the following three variables to the ZRMSSECN procedure:
Variable Value
&OPTION Code that identifies the selected RMS option (refer to Table 3-1)
&SETNAME Name of the ruleset selected (if applicable); otherwise blank
&USERID User ID of the user who selected the RMS option
You can use the installation attributes in a NonStop NET/MASTER MS user ID
definition to control access to RMS. Use the following steps as a guide on how to
control access to RMS:
1. There are four user installation attributes in a user ID definition, each containing
32 characters (bytes). Reserve the required number of characters for use by RMS:
one character for each RMS option to which you want to control access. (See
Table 3-1 for the possible RMS options to which you can control access.) You can
use any character position provided you have not reserved that position for
another purpose. Use each character position to represent whether a user has
access to a particular RMS option. For example, N can mean access is not allowed,
and Y can mean access is allowed. Reserve at least one character to control access
to the RMS primary menu panel. You cannot use the characters reserved for RMS
for any other purposes.
2. For each user ID definition, flag the reserved set of characters according to how
you want to control the access to the different RMS options. For example, you can
type Y in one character position to allow access to the option represented (you
customize the NCL procedure ZRMSSECN to check this information and act
accordingly). Set the flags through the NonStop NET/MASTER MS User ID
Management Services on the UMS : User Installation Attributes panel. The four
fields are Installation Attribute 1 through Installation Attribute 4. See “Setting the
User Installation Attributes” later in this section for an example.
3. Customize the ZRMSSECN procedure to check the installation attributes of the
user accessing RMS as follows:
Note When customizing the ZRMSSECN procedure, ensure that you work on a copy in the ZNNMNCS
subvolume. The ZNNMNCS subvolume is provided for customized NCL files, and RMS looks for the
ZRMSSECN procedure in that subvolume before it looks in the ZNNMNDS subvolume. The original
procedure is retained in the ZNNMNDS subvolume for safekeeping.
a. Use the SECCALL QUERY verb to retrieve the user ID definition of the user
who tried to access RMS or one of its options.