Safeguard Management Programming Manual (G06.24+, H06.03+)

Elements of SPI Messages
Safeguard Management Programming Manual422086-012
4-3
Object Names
Users
User objects are identified in one of three ways:
By their group name.member name
By their group number,member number (ASCII character string)
By their user ID in integer form.
The integer user ID must be prefixed with the special delimiter two byte character
string "==". The object name length is four bytes.
TAL examples:
! the first word of the object name is the length
INT .objectName[ 0:9 ];
! user object name in the form <group>.<user>
object name[1] ':=' "SOFTWARE.GREG";
object name[0] := 13;
! user object name in the form <group number>, <member number>
object name[1] ':=' "1,174";
object name[0] := 5;
Remote Passwords
Remote passwords are identified by a user name or alias concatenated with a system
name. Examples of remote passwords are SOFTWARE.GREG\FOXII and
ALIAS:GregJ\FOXII. (For more information, see ADD REMOTEPASSWORD
Command on page 7-43.)
Protection Records
Protection records are identified by a dollar sign followed by the name of the object
they are protecting. These objects can be volumes, subvolumes, disk files, processes,
subprocesses, devices, subdevices, or the special object type. Some examples of
protection records are $RELEASE, $DATA.TNDM.PAYROLL, and $SNAX.#LU1.
When an object is defined to the operating system, the Safeguard software can
determine the type of protection record. When the object has not been defined to the
operating system, you need to specify the type of protection record by prefixing the
protection record name with an object type descriptor:
VOLUME
SUBVOLUME
DISKFILE
DISKFILE-PATTERN
PROCESS