OSI/FTAM Configuration and Management Manual

Planning, Installing, and Configuring Tandem FTAM
OSI/FTAM Configuration and Management Manual421944-001
3-25
Mapping of FTAM File-Security Attributes to
Guardian Security Settings
The following rules apply to changing the access-control attribute:
For insert values:
If the read access-control bit of the action-list is set, the responder sets READ access
to N, indicating that any user on the Expand network can read the file.
If any of the insert, replace, extend, change-attribute, or erase access-control bits of
the action list are set, the responder sets WRITE access to N, indicating that any
user on the Expand network can write to the file.
If the delete-file access-control bit of the action-list is set, the responder sets
PURGE access to N, indicating that any user on the Expand network can purge the
file.
For delete values:
If the read access-control bit of the action list is set, the responder sets READ access
to –, indicating that only the super ID user can read the file.
If all of the insert, replace, extend, change-attribute, or erase access-control bits of
the action list are set, the responder sets WRITE access to –, indicating that only the
super ID user can write to the file. If only some of these access-control bits are set,
there is no change.
If the delete-file access-control bit of the action list is set, the responder sets PURGE
access to –, indicating that only the super ID user can purge the file.
Note. .EXECUTE access is always set to –, indicating that only the super ID user can execute
the file.