TS/MP Pathsend and Server Programming Manual (G06.24+, H06.03+)
Writing Pathsend Requesters
NonStop TS/MP Pathsend and Server Programming Manual–132500
3-7
Avoiding Coded PATHMON Names
This level of security is required because the LINKMON process must be able to open 
the PATHMON process (to make link requests); the LINKMON process must be able to 
open the server processes (to send user requests); and the PATHMON process must be 
able to open the server processes (to send startup messages). All of these opens are 
performed with the PATHMON user ID. 
Server-Class Security
LINKMON processes perform authorization checks on each server-class send operation 
to make sure that the user ID of the Pathsend process at the time of the send conforms to 
the server class’s OWNER and SECURITY attributes. You set these attributes for server 
classes at configuration time if those server classes are to be accessed by Pathsend 
processes.
The NonStop TS/MP System Management Manual describes how to set the SERVER 
OWNER and SERVER SECURITY parameters in PATHCOM.
RSC Client Security
Remote Server Call (RSC) workstation clients can be allowed or disallowed to 
communicate with specified Pathway servers. You can set up security validation by 
creating an Access Control Server (ACS). For more information about creating an ACS, 
refer to the Remote Server Call (RSC) Programming Manual.
Avoiding Coded PATHMON Names
SCREEN COBOL requesters can send requests to Pathway server classes without 
having to specify the name of the PATHMON process controlling the server class, 
because the TCP has a default PATHMON process to send to. Pathsend processes, 
however, must specify the PATHMON name of the server class to send to, because the 
Pathsend procedures provide no default PATHMON name.
It is possible, however, to avoid coding PATHMON names in Pathsend programs. For 
example, you can use ASSIGNs containing the PATHMON system and process name. 
Or, if the Pathsend process is a Pathway server, the process can use the name of its 
creator as the default PATHMON name to send to. This method of avoiding coding the 
PATHMON name is reliable as long as the sending server is not associative, in which 
case its creator might not be a PATHMON process.
The Pathsend program examples BREQ and PATHSRV in Appendix B, Examples
, use 
ASSIGNs to avoid coding PATHMON names. The PATHSRV example also uses the 
creator default method just described to avoid coding the PATHMON names.
Note. The user ID of the Pathsend process need not have remote passwords to the 
PATHMON system or to the server-class system to access the server class. Moreover, the 
Pathsend-process user ID need not be known on the PATHMON or server-class systems.










