OSF DCE Administration Guide--Core Components

OSF DCE Administration Guide—Core Components
27.2 The Registry Database ............... 27-2
27.3 Physical Security of the Database ............ 27-3
27.4 How the Registry Database is Stored ........... 27-3
27.5 Replicated Databases ................ 27-4
27.6 How Updates Are Handled .............. 27-4
27.6.1 Master and Slave Replicas ............ 27-5
27.6.2 Handling Database Updates ........... 27-6
27.6.3 Propagating Database Changes .......... 27-7
27.6.4 Master/Slave Authentication ........... 27-7
27.7 The /etc/passwd and /etc/group Files and the Registry ...... 27-7
27.8 The Local Registry ................. 27-8
27.9 Names for Security Objects .............. 27-8
27.9.1 Using Names with dcecp Security Commands ...... 27-9
27.9.2 Using Names with the dcecp acl Command ....... 27-9
Chapter 28. Using Access Control Lists ................ 28-1
28.1 Authorization Overview ............... 28-1
28.1.1 ACL Managers ............... 28-2
28.1.2 ACL Interpretation .............. 28-3
28.1.3 Credentials Inherited by Processes ......... 28-4
28.2 ACL Entries and Masks ............... 28-4
28.2.1 ACL Syntax ................ 28-5
28.2.2 ACL Entry Types for Principals and Groups ....... 28-6
28.2.3 Group Permissions and Project Lists ......... 28-9
28.2.4 Using Principal and Group ACL Entries ........28-10
28.2.5 ACL Entry Types for Masks ...........28-10
28.2.6 ACL Entry Types for Dissimilar DCE Releases ......28-11
28.2.7 The Checking Sequence for ACL Entries .......28-12
28.2.8 Denying Access ...............28-15
28.3 ACL Management Tasks ...............28-16
28.4 Copying ACLs ..................28-16
28.5 Generating ACLs from Files ..............28-17
28.6 Container ACLs ................. 28-17
28.6.1 Objects and Containers .............28-18
28.6.2 Initial ACLs for Objects and Containers ........28-18
28.6.3 Effect of Masks When Editing ACLs .........28-21
Chapter 29. Control Programs for Managing the DCE Security Service ....... 29-1
29.1 Using the DCE Control Program ............. 29-1
29.1.1 Security Service Objects ............ 29-2
29.1.2 DCE Control Program Operations for the DCE Security
Service ................. 29-2
29.2 Using the Registry Editor ............... 29-4
29.2.1 Starting, Stopping, and Getting Help ......... 29-4
29.2.2 rgy_edit Commands for Local Registry
Maintenance ................ 29-5
29.3 Using the sec_admin Program ............. 29-6
29.3.1 Starting, Stopping, and Getting Help ......... 29-6
xii Tandem Computers Incorporated 124243