User Manual

System Management
HP NonStop AutoTMF Software User’s Guide429952-014
A-19
Object File Access Security
additional Enscribe operations), but these operations are subject to the same security
control as provided for all application access to data.
Object File Access Security
Normally, only execute access authority is required to run a program. With NonStop
AutoTMF software, however, both read and execute access authority is required to run
a prepared program.
The NonStop AutoTMF software runtime needs to determine if a program has
embedded SQL and a few other important facts obtained by reading the object file.
Thus, you must give each user who runs an object file both execute and read access
authority to the file; write access authority is not required.
To prepare an application program to use NonStop AutoTMF software, the object file is
modified to intercept procedure calls and assign a user library; this requires write
access authority.
Configuration Security
When used in production, NonStop AutoTMF software becomes an essential part of
the application and must be protected against damage or misuse. Ideally, the
installation should have a designated person or small group that is responsible for
performing basic maintenance of the NonStop AutoTMF software environment.
Product Security
The files in the product subvolume should be managed in a manner similar to the
system components in $SYSTEM.SYSTEM. The files should be protected against
change or deletion by unauthorized persons.
System Database Security
The System Database (SysDB) contains the licensing information and many global
settings that will affect all applications that are prepared to use Escort. To prevent
inadvertent changes to the SysDB, you should limit write access authority to the users
that are responsible for maintaining the NonStop AutoTMF software environment. This
is usually accomplished when the SysDB is created (see the CREATE SYSDB on
page 6-54) or by use of a SQLCI ALTER TABLE command for both the REGISTRY
and MAPDBS tables.
Application programs have no need to access the SysDB; the monitor process
provides all the SysDB information required by applications.
Mapping Database Security
Security of the Mapping Database (MapDB) is less of an issue than the security of the
SysDB as long as the personnel accessing and updating it can be expected to act