RDF/IMP and IMPX System Management Manual (RDF 1.4+)
Installing and Configuring RDF
HP NonStop RDF/IMP and IMPX System Management Manual—524388-001
3-11
Security Guidelines
Security Guidelines
The information that follows will help you establish appropriate HP NonStop Kernel
operating system and Safeguard security for your RDF environment. Table 3-1
identifies the special security-related attributes for each type of program in an RDF
environment.
Table 3-1. RDF Process and Program Security Attributes
Program Name
Run Under a
Specific Logon ?
LICENSE Required
for Object File?
RDFCHEK NO YES
RDFCOM YES; 255,nnn +YES
RDFEXTO YES ++ YES
RDFMONO YES ++ YES
RDFNETO YES ++ NO
RDFRCVO YES ++ YES
RDFPRGO YES ++ YES
RDFSCAN NO++++ NO
RDFSNOOP YES +++ YES
RDFUPDO YES ++ YES
READLIST NO YES
RDIMAGE YES ++ YES
+ RDFCOM operational commands require super-user group access; however, INFO and STATUS
commands can be issued by all users.
++ The RDF processes run under the same user ID as the user that issued the START RDF command.
+++ RDFSNOOP requires super-user group access to read image files.
++++ Depends upon security of entry-sequenced file being accessed.