Security Management Guide (G06.29+, H06.08+, J06.03+)
Index
Security Management Guide — 522283-021
Index - 7
U
defined 7-17
detection of 7-17
Trusted software 2-7
U
umask command 4-7, 7-22
User aliases 3-11, 6-4
User attributes
DEFAULT-PROTECTION 3-8
INITIAL-DIRECTORY 4-1
USER-EXPIRES 3-7
User community
and Safeguard 3-7
verifying validity of 8-2
User education 1-1
User expiration
example 3-7
verifying existence of 8-4
User IDs
and authentication 7-5
maintenance of 5-3
removing 3-10, 6-6
reusing 6-7
syntax of 7-5
using in applications 5-1
User mask 4-7
User names
and authentication
7-5
defined 2-3
managing 6-1
reusing 6-7
USERID file
converting
3-2
ownership of 2-8
security of 2-8
USERS command
to determine default security
7-12
to determine group manager 7-6
User, local 7-11
USER-EXPIRES attribute 3-7
USER_AUTHENTICATE_ procedure
call 5-1, 5-2, 7-11
Utility programs 8-1
V
Volume
create authority 4-2
protection 7-15
VOLUME command 7-12
W
Warning mode 3-14
WHO command 7-12
WRITE authority 7-10
Z
ZZSAPRIV subvolume 3-16
Special Characters
#DEFAULTS 7-20
#PMSEARCHLIST 7-19
#TACLSECURITY 7-14
$CMON
and logon messages 6-15
and multiple user names 6-4
programs 2-20, 8-4
* (wild card for ACCESS authorities) 3-13
**** (security string) 3-21, 7-10, 7-15
.profile file 4-7