Security Management Guide (G06.29+, H06.08+, J06.03+)
Glossary
Security Management Guide — 522283-021
Glossary - 4
external password
external password. A secondary password provided for additional authentication when a
person first establishes a terminal session. External passwords are usually system
wide, and changed on a regular basis to prevent unauthorized access to the system.
file permission bits. Information about a file that is used, along with other information, to
determine whether a process has read, write, or execute/search permission to that file.
The bits are divided into three parts: owner, group, and other. Each part is used with
the corresponding file class of process.
FILEINFO command. A TACL command that displays detailed information about a file (for
example, size, time and date of latest modification, owner’s user ID, and security
setting).
FUP. File Utility Program; an NonStop system utility that performs various file operations.
group list. An attribute of a process that is used with the effective group ID of the process
to determine the file access permissions for the process.
group manager. Any user ID that has a user ID number ending in 255 (such as 1,255 or
101,255). A group manager can have particular authorizations regarding user IDs
within the group, including adding and deleting user IDs and bypassing the
authentication requirements for any particular user ID within that group.
Guardian environment. An application program interface of a NonStop system. The
Guardian environment provides a set of functions and tools that permit user programs
to communicate with the NonStop operating system.
installation. An operation to transfer software or data from distribution media (for example,
magnetic tape) to the online media of a computer system. Installation typically requires
particular authorizations to modify devices and files not generally accessible.
interface. A connection and the protocol used by that connection. For example, the
connection between the user and the system is a terminal, so the terminal is the
interface.
intruder. A person (not necessarily an outsider) who makes unauthorized use of a
computer system.
least privilege. The practice of giving subjects only those permissions nece
ssary to perform
authorized tasks.
license. An authorization assigned to a program file by the super ID that allows the program
to access system data structures while executing. Licensing is typically done only for
NonStop software to allow for critical operations not available through the procedure-
call interface.
link encryption. Encryption and decryption of dat
a between two links of a data
communications system. See also
bulk encryption.