OSF DCE Application Development Guide--Core Components

Index
opening audit trail
file for
reading, 34-6
reading audit records
into a buffer,
34-6
specifying amount of
header
information,
34-3
transforming audit
records into
text, 34-7
clients, 33-2
code point, 33-2
data type, 34-4
event, 33-3
event class, 33-5
event class number, 33-5
event name, 33-3
event number, 33-3
event-id, 33-3
format, 33-3
set-id, 33-3
record
criteria for selection,
34-6
predicates, 34-6
structure, 33-6
service, 33-1
components, 33-1
concepts, 33-2
features, 33-1
trail file, 33-7
life cycle of, 33-7
writing analysis and
examination
tools, 34-5
authenticated RPC
access checking, 14-10
and DCE security, 14-8,
14-11
and RPC runtime, 14-8
authenticate, 14-1
authentication, 14-8
cross-cell, 14-9
authorization, 14-1
See also
authorization
basic operations, 13-2
choosing a server principal
name, 14-24
definition, 14-7
protection level, 14-8, 14-9
routines, 14-12
server principal name, 14-8,
14-12
authenticating applications that use
GSSAPI, 23-23
authentication, 14-8, 22-3, 23-1 to
23-27
commands, 23-6, 23-7
mutual surrogates, 23-26
protection level, 14-9
protocol. See shared-secret
authentication
protocol
protocols, 24-1
See also protocols
server principal name, 14-8,
14-12
surrogates, 23-2
third-party, 23-7
authentication service. See
authentication
authorization, 14-8, 14-10, 22-3, 24-1
to 24-11
certified, 14-11
DCE, 14-11
name-based, 14-11
options, 14-10
protocols, 24-1
See also protocols
with PACs, 14-11
authorization interface, authenticated
RPC, 14-1
automatic binding, 18-5
auto_handle attribute, 18-3, 18-5,
18-29
avoiding
deadlocks, 8-12
nonreentrant software, 8-10
priority inversion, 8-11
race conditions, 8-12
124245 Tandem Computers Incorporated Index3