RDF/IMP and IMPX System Management Manual (RDF 1.4+)
Installing and Configuring RDF
HP NonStop RDF/IMP and IMPX System Management Manual—524388-001
3-11
Security Guidelines
Security Guidelines
The information that follows will help you establish appropriate HP NonStop Kernel 
operating system and Safeguard security for your RDF environment. Table 3-1 
identifies the special security-related attributes for each type of program in an RDF 
environment. 
Table 3-1. RDF Process and Program Security Attributes
Program Name
Run Under a 
Specific Logon ?
LICENSE Required
for Object File?
RDFCHEK NO YES
RDFCOM YES; 255,nnn +YES
RDFEXTO YES ++ YES
RDFMONO YES ++ YES
RDFNETO YES ++ NO
RDFRCVO YES ++ YES
RDFPRGO YES ++ YES
RDFSCAN NO++++ NO
RDFSNOOP YES +++ YES
RDFUPDO YES ++ YES
READLIST NO YES
RDIMAGE YES ++ YES
+  RDFCOM operational commands require super-user group access; however, INFO and STATUS
 commands can be issued by all users.
++  The RDF processes run under the same user ID as the user that issued the START RDF command.
+++  RDFSNOOP requires super-user group access to read image files.
++++  Depends upon security of entry-sequenced file being accessed.










