<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: secondary group for the user in Operating System - OpenVMS</title>
    <link>https://community.hpe.com/t5/operating-system-openvms/secondary-group-for-the-user/m-p/3963330#M11843</link>
    <description>Hein,&lt;BR /&gt;&lt;BR /&gt;Actually, the way I do it it is straightforward. First, I use the logical name to only contain a list of disabled (or enabled) user groups/applications.&lt;BR /&gt;&lt;BR /&gt;Then, if you want to track who attempted to login (and you want the audit events), simply create a file that is checked (if you disable logins for that group, simply protect the file and you will get an alarm).&lt;BR /&gt;&lt;BR /&gt;- Bob Gezelter, &lt;A href="http://www.rlgsc.com" target="_blank"&gt;http://www.rlgsc.com&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
    <pubDate>Fri, 16 Mar 2007 16:26:09 GMT</pubDate>
    <dc:creator>Robert Gezelter</dc:creator>
    <dc:date>2007-03-16T16:26:09Z</dc:date>
    <item>
      <title>secondary group for the user</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/secondary-group-for-the-user/m-p/3963317#M11830</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;Is there any secondary group funda in the Open VMS? If there how to create the secondary group for the user?&lt;BR /&gt;&lt;BR /&gt;Actually I want to make create a .com file, which after executing will allow only limited and particular defined users only to login.&lt;BR /&gt;&lt;BR /&gt;Rest all other users will not able to login.&lt;BR /&gt; &lt;BR /&gt;Also if any user is already logged in, afer running this file,his session should get killed if his username or UID is not mentioned in the group which is allowed.&lt;BR /&gt;&lt;BR /&gt;have U any plans or script for this?&lt;BR /&gt;&lt;BR /&gt;Amit.&lt;BR /&gt;</description>
      <pubDate>Fri, 16 Mar 2007 05:48:02 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/secondary-group-for-the-user/m-p/3963317#M11830</guid>
      <dc:creator>Amit Phadnis</dc:creator>
      <dc:date>2007-03-16T05:48:02Z</dc:date>
    </item>
    <item>
      <title>Re: secondary group for the user</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/secondary-group-for-the-user/m-p/3963318#M11831</link>
      <description>The command procedure could define a logical name. In SYLOGIN you could check for this login and only allow the required users to login. The command procedure could also scan for users currently logged in and log them out (see F$CONTEXT, F$PID, F$GETJPI)&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 16 Mar 2007 06:33:20 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/secondary-group-for-the-user/m-p/3963318#M11831</guid>
      <dc:creator>Ian Miller.</dc:creator>
      <dc:date>2007-03-16T06:33:20Z</dc:date>
    </item>
    <item>
      <title>Re: secondary group for the user</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/secondary-group-for-the-user/m-p/3963319#M11832</link>
      <description>Amit,&lt;BR /&gt;&lt;BR /&gt;If I understand the posting correctly, there are really two questions: &lt;BR /&gt;&lt;BR /&gt;1) can I limit logins to a particular group?&lt;BR /&gt;2) can I log off users who do not belong to this group?&lt;BR /&gt;&lt;BR /&gt;The answer to both questions is yes, although the techniques are different.&lt;BR /&gt;&lt;BR /&gt;Microsoft's Windows family of systems (Windows NT, 2000, XP, 2003, VISTA) use a concept of accounts belonging to multiple groups as part of their security model. For example, an account may be a member of the Admistrator, Site Administrator, and Remote Users groups). OpenVMS uses a slightly different model.&lt;BR /&gt;&lt;BR /&gt;In OpenVMS, users have a single group assignment. This is used for as part of the privilege and basic file management scheme. Users (and their processes) and also may hold a collection of Identifiers. The meaning of "Holding an Identifier" is most commonly access rights to a set of files and resources, which is part of the overall protection environment. &lt;BR /&gt;&lt;BR /&gt;Identifier possession can also be checked from DCL (using the lexical function F$GETJPI) and the underlying system serice or run time library call from within programs. How to do this is covered briefly in my DECUS presentation "DCL Lexicals: OpenVMS Juhitsu" from the 1995 Fall US DECUS Symposium, available through &lt;A href="http://www.rlgsc.com/decus/usf95/index.html" target="_blank"&gt;http://www.rlgsc.com/decus/usf95/index.html&lt;/A&gt; &lt;BR /&gt;&lt;BR /&gt;A modification to SYS$MANAGER:SYLOGIN.COM to check for a particular Identifier under certain circumstances is not difficult. Please remember to omit the consequences if the user is a member of one of the system management groups (or holds the SYSPRV) privilege. &lt;BR /&gt;&lt;BR /&gt;Logging people off who are already on is more complex, but can be done.&lt;BR /&gt;&lt;BR /&gt;I hope that I have been of assistance. If I have been unclear, please let me know.&lt;BR /&gt;&lt;BR /&gt;- Bob Gezelter, &lt;A href="http://www.rlgsc.com" target="_blank"&gt;http://www.rlgsc.com&lt;/A&gt;</description>
      <pubDate>Fri, 16 Mar 2007 06:38:39 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/secondary-group-for-the-user/m-p/3963319#M11832</guid>
      <dc:creator>Robert Gezelter</dc:creator>
      <dc:date>2007-03-16T06:38:39Z</dc:date>
    </item>
    <item>
      <title>Re: secondary group for the user</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/secondary-group-for-the-user/m-p/3963320#M11833</link>
      <description>There are scripts floating around to prohibit multiple logins&lt;BR /&gt;&lt;BR /&gt;The best method on VMS for this is to simply $OPEN/ERROR=in_use a specific file exclusively. If that works, the process is the first and only. If it fails, well it is in use and the scipt jumps to label 'in_use' where you issue an expkanation, log the event and exit.&lt;BR /&gt;&lt;BR /&gt;There is no multy group concept, but something close and better on VMS: RIGHTS.&lt;BR /&gt;You PROTECT specific OBJECTS (like files) and then allow holders os specific RIGHT to access them A user can have many or no rights.&lt;BR /&gt;&lt;BR /&gt;Please check the manuals (and help) for a while before asking details.&lt;BR /&gt;Hints:&lt;BR /&gt;$HELP SHOW PROC/RIGHT&lt;BR /&gt;$MCR AUTHORIZE HELP GRANT&lt;BR /&gt;$MCR AUTHORIZE HELP ADD&lt;BR /&gt;$HELP SET SECU&lt;BR /&gt;:&lt;BR /&gt;&lt;BR /&gt;hth,&lt;BR /&gt;Hein van den Heuvel&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 16 Mar 2007 06:39:07 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/secondary-group-for-the-user/m-p/3963320#M11833</guid>
      <dc:creator>Hein van den Heuvel</dc:creator>
      <dc:date>2007-03-16T06:39:07Z</dc:date>
    </item>
    <item>
      <title>Re: secondary group for the user</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/secondary-group-for-the-user/m-p/3963321#M11834</link>
      <description>Heuvel,&lt;BR /&gt;&lt;BR /&gt;As you have mentioned, we can use RIGHT concept to protecting the users from login. But in that case, that will be all time protection.&lt;BR /&gt;&lt;BR /&gt;my requirement is such that, suppose we are having server maintainance and we want no users should login except system administrators. In such case these prevetion of login to others users is for particular short time. After which they again should able to login.&lt;BR /&gt;&lt;BR /&gt;Will this thing can achieved by logic you are suggesting?&lt;BR /&gt;&lt;BR /&gt;Amit.</description>
      <pubDate>Fri, 16 Mar 2007 07:50:31 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/secondary-group-for-the-user/m-p/3963321#M11834</guid>
      <dc:creator>Amit Phadnis</dc:creator>
      <dc:date>2007-03-16T07:50:31Z</dc:date>
    </item>
    <item>
      <title>Re: secondary group for the user</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/secondary-group-for-the-user/m-p/3963322#M11835</link>
      <description>The method suggested by Ian is the neatest way to lock out general users. Setting this up requires some DCL skills and familiarity with lexicals.&lt;BR /&gt;&lt;BR /&gt; Another method is to set interactive logins to zero, thereby stopping any users without OPER privelege logging in. This method assumes that your general user base does not have OPER privelege.</description>
      <pubDate>Fri, 16 Mar 2007 08:04:46 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/secondary-group-for-the-user/m-p/3963322#M11835</guid>
      <dc:creator>Martin Hughes</dc:creator>
      <dc:date>2007-03-16T08:04:46Z</dc:date>
    </item>
    <item>
      <title>Re: secondary group for the user</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/secondary-group-for-the-user/m-p/3963323#M11836</link>
      <description>&amp;gt;&amp;gt; As you have mentioned, we can use RIGHT concept to protecting the users from login. But in that case, that will be all time protection.&lt;BR /&gt;&lt;BR /&gt;Well, you could dynamically chance security settings, but that does not feel right.&lt;BR /&gt;&lt;BR /&gt;Admittedly I read your question differently from what you intended and now clarified.&lt;BR /&gt;&lt;BR /&gt;Teh file mechanism was in fact a cheap / simple wrapper aroudn the OpenVMS Lock Manager. &lt;BR /&gt;&lt;BR /&gt;LOCKS, not logical names, are the very best way to control this, but require real programming, not scripting. You can require a concurrent-read lock for 'normal users'. In special times, request a 'protected write' lock. This can trigger a blocking AST in for the normal users allowing for very gracefull end (message to screen). If the user do not go, then GETLKI can be used to find out who is blocking. Cluster wide. Sweet stuff!&lt;BR /&gt;&lt;BR /&gt;Files can be used to approach this:&lt;BR /&gt;$OPEN/READ/SHARE=READ/ERROR=closed_for_business for normal use.&lt;BR /&gt;$OPEN/READ/ERROR=kill_users for super use.&lt;BR /&gt;&lt;BR /&gt;$SHOW DEV/FILE would give a quick list of PIDs to STOP if neede.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&amp;gt;&amp;gt; my requirement is such that, suppose we are having server maintainance and we want no users should login except system administrators. &lt;BR /&gt;&lt;BR /&gt;Would that be for 1 system, or the cluster?&lt;BR /&gt;&lt;BR /&gt;Anyway, the OPER priv, as replied just now, already implements the prevention of login in. It does not kill. A quick DCL loop with F$GETJPI and checking for processes holding OPER priv should be easy enough to construct.&lt;BR /&gt;Be sure to use 'STOP/EXIT' instead of, or before 'STOP/ID' to give processes a chance to clean up. (flush RMS buffers). On older VMS versions you may need a little program (as provided below) to achieve that.&lt;BR /&gt;&lt;BR /&gt;Hein.&lt;BR /&gt;&lt;BR /&gt;#include stdio&lt;BR /&gt;main(int argc, char *argv[])&lt;BR /&gt;{&lt;BR /&gt;    int pid, sys$forcex();&lt;BR /&gt;    if (argc &amp;lt; 2) return 16;&lt;BR /&gt;    sscanf (argv[1], "%x", &amp;amp;pid);&lt;BR /&gt;    return sys$forcex(&amp;amp;pid,0,0);&lt;BR /&gt;}&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&amp;gt;&amp;gt; In such case these prevetion of login to others users is for particular short time. After which they again should able to login.&lt;BR /&gt;&lt;BR /&gt;I might still prefer, and try to get, to blcok specific activities, not the login.&lt;BR /&gt;Surely there is no harm just having them logged in. They should just not be able to do certain things which is different all together. Blocking login is too big a hammer for a subtle person like myself :-).&lt;BR /&gt;&lt;BR /&gt;Compare with cellphones in the airplane/theater/meetings. Do you want to prevent the audience from walking in with a phone (at performance times) or do you just want them not to use it during special times?&lt;BR /&gt;&lt;BR /&gt;&amp;gt;&amp;gt; Will this thing can achieved by logic you are suggesting?&lt;BR /&gt;&lt;BR /&gt;Ys, As per shared file explanation.&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;Hein&lt;BR /&gt;</description>
      <pubDate>Fri, 16 Mar 2007 08:38:25 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/secondary-group-for-the-user/m-p/3963323#M11836</guid>
      <dc:creator>Hein van den Heuvel</dc:creator>
      <dc:date>2007-03-16T08:38:25Z</dc:date>
    </item>
    <item>
      <title>Re: secondary group for the user</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/secondary-group-for-the-user/m-p/3963324#M11837</link>
      <description>Amit,&lt;BR /&gt;&lt;BR /&gt;Preventing users from logging on during maintenance is straightforward using identifiers. &lt;BR /&gt;&lt;BR /&gt;The (most flexible) way it is done is to define a logical name in the system, group, or other persistent logical name table that specifies what identifiers are PROHIBITED from logging onto the system at this time. Then then embed the appropriate check in the SYS$MANAGER:SYLOGIN.COM file (I have also accomplished similar things using group login files and concealed logical names, as was described in my OpenVMS Technical Journal, article (see &lt;A href="http://www.rlgsc.com/publications/vmstechjournal/inheritance.html" target="_blank"&gt;http://www.rlgsc.com/publications/vmstechjournal/inheritance.html&lt;/A&gt; ).&lt;BR /&gt;&lt;BR /&gt;In this way, "maintenance" can be defined in a far less privileged way, since the Group Logical Name tables are controlled by a different privilege. The same thing can be done with separate logical name tables to control different applications.&lt;BR /&gt;&lt;BR /&gt;The key to this is the list of identifiers held by each user, and locating user default directories on a rooted directory tree pointed to by a concealed logical name (as described in the article).&lt;BR /&gt;&lt;BR /&gt;- Bob Gezelter, &lt;A href="http://www.rlgsc.com" target="_blank"&gt;http://www.rlgsc.com&lt;/A&gt;</description>
      <pubDate>Fri, 16 Mar 2007 08:52:11 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/secondary-group-for-the-user/m-p/3963324#M11837</guid>
      <dc:creator>Robert Gezelter</dc:creator>
      <dc:date>2007-03-16T08:52:11Z</dc:date>
    </item>
    <item>
      <title>Re: secondary group for the user</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/secondary-group-for-the-user/m-p/3963325#M11838</link>
      <description>Amit,&lt;BR /&gt;&lt;BR /&gt;you specified&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt;&lt;BR /&gt;my requirement is such that, suppose we are having server maintainance and we want no users should login except system administrators&lt;BR /&gt;&amp;lt;&amp;lt;&amp;lt;&lt;BR /&gt;&lt;BR /&gt;VMS (or OpenVMS, which really are the same) has, from the earliest I can remember, always had a dedicated mechanism for that:&lt;BR /&gt;$ SET LOGINS/INTERACTIVE=0&lt;BR /&gt;&lt;BR /&gt;Then only users that have DEFAULT  PRIV = OPER (typically system managers &amp;amp; operators, or what you call Administrators) in their authorisation are allowed to log in.&lt;BR /&gt;&lt;BR /&gt;If service is to resume, then simply&lt;BR /&gt;$ SET LOGIN/INTER=&lt;BIG_ENOUGH_VALUE&gt;&lt;BR /&gt;&lt;BR /&gt;hope this helps&lt;BR /&gt;&lt;BR /&gt;Proost.&lt;BR /&gt;&lt;BR /&gt;Have one on me.&lt;BR /&gt;&lt;BR /&gt;jpe&lt;/BIG_ENOUGH_VALUE&gt;</description>
      <pubDate>Fri, 16 Mar 2007 10:30:12 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/secondary-group-for-the-user/m-p/3963325#M11838</guid>
      <dc:creator>Jan van den Ende</dc:creator>
      <dc:date>2007-03-16T10:30:12Z</dc:date>
    </item>
    <item>
      <title>Re: secondary group for the user</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/secondary-group-for-the-user/m-p/3963326#M11839</link>
      <description>The use of a logical name containing the list of "exceptions" and a check in SYS$SYLOGIN has been proposed, and that will work.  I will make an alternative proposal.&lt;BR /&gt;&lt;BR /&gt;The use of identifiers (RIGHTS) can be used here.  Specifically, the combination of process and system rights.&lt;BR /&gt;&lt;BR /&gt;First create an identifier that you will grant to users that you want to allow to log onto the system when the others are disallowed.  For this example, I will use DB_ACC.  This same identifier can be used to grant access to files, or even charge disk quota against if it has the resource attribute.&lt;BR /&gt;&lt;BR /&gt;Now grant this identifier to all the users that you want to be able to log in at all times.&lt;BR /&gt;&lt;BR /&gt;Now the non-obvious part.  VMS allows you to grant an identifier to the current node (system).  These rights show up in the System rights: list at the bottom of the output from &lt;BR /&gt;&lt;BR /&gt;$ show process/rights&lt;BR /&gt;&lt;BR /&gt;On most systems, the only identifier that will show up here is the node specific identifier, SYS$NODE_nodename.  For example, if your nodename is AMIT, you will see SYS$NODE_AMIT.&lt;BR /&gt;&lt;BR /&gt;Let's assume that you normally allow all users to login, but prohibit logins when some special system maintenance is in process.&lt;BR /&gt;&lt;BR /&gt;In your SYS$COMMON:[SYSMGR]SYSTARTUP_VMS.COM issue the command: &lt;BR /&gt;&lt;BR /&gt;$ set rights/enable/system DB_ACC&lt;BR /&gt;&lt;BR /&gt;Once that is active, all processes on that node will "hold" the DB_ACC identifier; i.e. it will show up in the list returned by f$getjpi("","RIGHTSLIST")&lt;BR /&gt;&lt;BR /&gt;After it has been added to the systems rightslist, put a check in your SYS$SYLOGIN to check whether this identifier is in the list of rights.&lt;BR /&gt;&lt;BR /&gt;For example&lt;BR /&gt;&lt;BR /&gt;$ myrights_c = "," + f$getjpi("","RIGHTSLIST") + ","&lt;BR /&gt;$ if f$locate(",DB_ACC,",myrights_c) .lt. f$length(myrights_c)&lt;BR /&gt;$ then&lt;BR /&gt;$   ! allow login&lt;BR /&gt;$ else&lt;BR /&gt;$   ! disallow login&lt;BR /&gt;$ endif&lt;BR /&gt;&lt;BR /&gt;Your command file to disable logins would then have the command:&lt;BR /&gt;&lt;BR /&gt;$ set rights/disable/system DB_ACC&lt;BR /&gt;&lt;BR /&gt;and to re-enable:&lt;BR /&gt;&lt;BR /&gt;$ set rights/enable/system DB_ACC&lt;BR /&gt;&lt;BR /&gt;Note that all UICs that have been explicitly granted the identifier will have DB_ACC in their process rightslist, and therefore taking it out of the system rightslist will not affect them.&lt;BR /&gt;&lt;BR /&gt;You also want to kill all the currently logged in processes that do not hold the DB_ACC identifier, so you will need to have the command procedure scan through all the processes as suggested by Ian Miller, but check if DB_ACC is in their process list, and kill them if it is not.  This is similar to the case with logical names.&lt;BR /&gt;&lt;BR /&gt;The advantage of using a logical name with a list of "excluded" users would be that it is much easier to change "on the fly".  If you have a cluster, you can even put the logical name in a clusterwide logical name table.  If you have a cluster, and you don't need to control access to files based on whether the identifier is held, then this is a lot simpler than using system rights, which must be enabled on each system in the cluster.&lt;BR /&gt;&lt;BR /&gt;The advantage of identifiers is that they can be used to protect access to various objects, like files and queues.&lt;BR /&gt;&lt;BR /&gt;We use the identifier method, and sysman to enable/disable the system rights clusterwide.&lt;BR /&gt;</description>
      <pubDate>Fri, 16 Mar 2007 12:08:59 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/secondary-group-for-the-user/m-p/3963326#M11839</guid>
      <dc:creator>Jon Pinkley</dc:creator>
      <dc:date>2007-03-16T12:08:59Z</dc:date>
    </item>
    <item>
      <title>Re: secondary group for the user</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/secondary-group-for-the-user/m-p/3963327#M11840</link>
      <description>Amit,&lt;BR /&gt;&lt;BR /&gt;I would tend to elect Jon Pinkley's method over my own!!&lt;BR /&gt;&lt;BR /&gt;And so mostly, because _HIS_ method also works for NON_interactive accesses..&lt;BR /&gt;&lt;BR /&gt;I worked it over twice, and found it so good, that I intend to implement it on OUR site (of course, after trying it on our sandbox)&lt;BR /&gt;&lt;BR /&gt;I was not aware of&lt;BR /&gt;$ set rights/enable/system &lt;BR /&gt;so, give Jon full points, and any you did not intend upon may be considered given by me.&lt;BR /&gt;&lt;BR /&gt;Proost.&lt;BR /&gt;&lt;BR /&gt;Have one on me.&lt;BR /&gt;&lt;BR /&gt;jpe</description>
      <pubDate>Fri, 16 Mar 2007 13:45:56 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/secondary-group-for-the-user/m-p/3963327#M11840</guid>
      <dc:creator>Jan van den Ende</dc:creator>
      <dc:date>2007-03-16T13:45:56Z</dc:date>
    </item>
    <item>
      <title>Re: secondary group for the user</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/secondary-group-for-the-user/m-p/3963328#M11841</link>
      <description>Jon,&lt;BR /&gt;&lt;BR /&gt;Enabling and disabling is an interesting solution.&lt;BR /&gt;&lt;BR /&gt;I admit that I prefer using the logical name approach for two reasons:&lt;BR /&gt;&lt;BR /&gt;- it can be controlled it on a cluster-wide basis if desired; and&lt;BR /&gt;- it can be controlled on a group-by-group basis (on some systems, I actually have implemented it to leave users on, just remove certain menu items during application maintenance)&lt;BR /&gt;&lt;BR /&gt;- Bob Gezelter, &lt;A href="http://www.rlgsc.com" target="_blank"&gt;http://www.rlgsc.com&lt;/A&gt;</description>
      <pubDate>Fri, 16 Mar 2007 14:29:53 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/secondary-group-for-the-user/m-p/3963328#M11841</guid>
      <dc:creator>Robert Gezelter</dc:creator>
      <dc:date>2007-03-16T14:29:53Z</dc:date>
    </item>
    <item>
      <title>Re: secondary group for the user</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/secondary-group-for-the-user/m-p/3963329#M11842</link>
      <description>&lt;BR /&gt;Yeah, but you can not see who looked at a logical name. You'll still need a mechanism (rights? privs?) to find out who to kill or suspend.&lt;BR /&gt;&lt;BR /&gt;A shared file is trival and gives a simple method to see who is blocking&lt;BR /&gt;&lt;BR /&gt;A lock gives that also, and can trigger action in consumers, but requires coding.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 16 Mar 2007 16:11:43 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/secondary-group-for-the-user/m-p/3963329#M11842</guid>
      <dc:creator>Hein van den Heuvel</dc:creator>
      <dc:date>2007-03-16T16:11:43Z</dc:date>
    </item>
    <item>
      <title>Re: secondary group for the user</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/secondary-group-for-the-user/m-p/3963330#M11843</link>
      <description>Hein,&lt;BR /&gt;&lt;BR /&gt;Actually, the way I do it it is straightforward. First, I use the logical name to only contain a list of disabled (or enabled) user groups/applications.&lt;BR /&gt;&lt;BR /&gt;Then, if you want to track who attempted to login (and you want the audit events), simply create a file that is checked (if you disable logins for that group, simply protect the file and you will get an alarm).&lt;BR /&gt;&lt;BR /&gt;- Bob Gezelter, &lt;A href="http://www.rlgsc.com" target="_blank"&gt;http://www.rlgsc.com&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 16 Mar 2007 16:26:09 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/secondary-group-for-the-user/m-p/3963330#M11843</guid>
      <dc:creator>Robert Gezelter</dc:creator>
      <dc:date>2007-03-16T16:26:09Z</dc:date>
    </item>
    <item>
      <title>Re: secondary group for the user</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/secondary-group-for-the-user/m-p/3963331#M11844</link>
      <description>Bob,&lt;BR /&gt;&lt;BR /&gt;yes, that is about the thing we use, but with finer granularity:&lt;BR /&gt;Each application requires an identifier to activate, and we rename the identifier if we want to block that applic.&lt;BR /&gt;The numeric value stays, and the user still holds it, but the Alphabetic check fails, disallowing activation (a lot better/faster/easier than re-granting ~3 - 4 K of users!)&lt;BR /&gt;The nodes that the app is allowed to run on is controlled by its DNS name pointing to the allowed nodes, and we catch any tricksters by system-wide LNMs to block access for those that somehow DO try to start the an app at a (temporarily?) forbidden node. Just fantastic for applic rolling upgrades!&lt;BR /&gt;&lt;BR /&gt;But still I LOVE the simplicity of system identifiers, and that mechanism escaped me until now.&lt;BR /&gt;&lt;BR /&gt;fwiw&lt;BR /&gt;&lt;BR /&gt;Proost.&lt;BR /&gt;&lt;BR /&gt;Have one on me.&lt;BR /&gt;&lt;BR /&gt;jpe</description>
      <pubDate>Fri, 16 Mar 2007 17:09:44 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/secondary-group-for-the-user/m-p/3963331#M11844</guid>
      <dc:creator>Jan van den Ende</dc:creator>
      <dc:date>2007-03-16T17:09:44Z</dc:date>
    </item>
    <item>
      <title>Re: secondary group for the user</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/secondary-group-for-the-user/m-p/3963332#M11845</link>
      <description>Jan van den Ende wrote:&lt;BR /&gt;&amp;gt;&amp;gt;I would tend to elect Jon Pinkley's method over my own!!&lt;BR /&gt;&lt;BR /&gt;&amp;gt;&amp;gt;And so mostly, because _HIS_ method also works for NON_interactive accesses..&lt;BR /&gt;&lt;BR /&gt;&amp;gt;&amp;gt;I worked it over twice, and found it so good, that I intend to implement it on OUR site (of course, after trying it on our sandbox)&lt;BR /&gt;&lt;BR /&gt;Jan, thanks for the kind words, but I am not sure how system identifiers alone solve the problem of non interactive access any better than the logical name approach, or even the set login/inter=0 approach. We can put ACL's on queues, but that will just cause a submit to fail, and that may or may not be what you want to happen.  For interactive users, it is probably ok, but do you want a batch job to fail when it tries to resubmit itself?&lt;BR /&gt;&lt;BR /&gt;In the simple case where all users that you want to allow in have OPER as a default privilege, then a stop/queue/next on user accessible queues, and set login/inter=0 + waiting for any running batch jobs to complete&lt;BR /&gt;is certainly a lot simpler than using system rights or logical names.  For Amit's case that may be sufficient.  That's what we used to do, but we now have the requirement to allow different "groups" of users in at different times, and the use of identifiers is the method I used.&lt;BR /&gt;&lt;BR /&gt;Be aware that if you are using the identifier for access checks in an ACL, having the identifier "pulled out from under" the process can cause failures.  The effect is immediate and seen by all processes on the system, just like a system logical name.  If the identifier is being used for file access checks in an ACL, and the identifier is removed, the next open will fail.  Files that are already open are not affected.  This can cause problems if you are not aware of what is happening.  e.g. a batch process that is partially complete could fail at the next file open.&lt;BR /&gt;&lt;BR /&gt;We have batch queues for each  set of users, and the batch queues are stopped before we do our maintenance.  If you allow an entry to start, and it exits due to not holding the identifier, the entry is lost.  So you need to either stop the queues, or use queue characteristics to prevent jobs from starting.&lt;BR /&gt;</description>
      <pubDate>Fri, 16 Mar 2007 17:26:06 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/secondary-group-for-the-user/m-p/3963332#M11845</guid>
      <dc:creator>Jon Pinkley</dc:creator>
      <dc:date>2007-03-16T17:26:06Z</dc:date>
    </item>
    <item>
      <title>Re: secondary group for the user</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/secondary-group-for-the-user/m-p/3963333#M11846</link>
      <description>Jan van den Ende wrote:&lt;BR /&gt;"Each application requires an identifier to activate, and we rename the identifier if we want to block that applic.&lt;BR /&gt;The numeric value stays, and the user still holds it, but the Alphabetic check fails, disallowing activation (a lot better/faster/easier than re-granting ~3 - 4 K of users!)&lt;BR /&gt;The nodes that the app is allowed to run on is controlled by its DNS name pointing to the allowed nodes, and we catch any tricksters by system-wide LNMs to block access for those that somehow DO try to start the an app at a (temporarily?) forbidden node. Just fantastic for applic rolling upgrades!"&lt;BR /&gt;&lt;BR /&gt;That's clever.  And it avoids the problem of an application failing due to an identifier being removed out from under it, since the ACLs are looking only at the binary values.&lt;BR /&gt;&lt;BR /&gt;Do you have this identifier check in the application (or a sharable image they link agaist)?  Do you use the identifier in any ACLs?&lt;BR /&gt; &lt;BR /&gt;Jon</description>
      <pubDate>Fri, 16 Mar 2007 18:09:10 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/secondary-group-for-the-user/m-p/3963333#M11846</guid>
      <dc:creator>Jon Pinkley</dc:creator>
      <dc:date>2007-03-16T18:09:10Z</dc:date>
    </item>
    <item>
      <title>Re: secondary group for the user</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/secondary-group-for-the-user/m-p/3963334#M11847</link>
      <description>Hi Jon,&lt;BR /&gt;&lt;BR /&gt;thanks for your wonderful solution and logic.&lt;BR /&gt;But I am facing problem when granting the identifier to the user. I am getting following error,&lt;BR /&gt;&lt;BR /&gt;UAF&amp;gt; grant/identifier LOGIN [600,5]&lt;BR /&gt;%UAF-W-NOTIDFMT, ID name parameter does not translate to ID format&lt;BR /&gt;&lt;BR /&gt;How to ge out of this error.&lt;BR /&gt;&lt;BR /&gt;Amit.</description>
      <pubDate>Thu, 22 Mar 2007 03:23:53 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/secondary-group-for-the-user/m-p/3963334#M11847</guid>
      <dc:creator>Amit Phadnis</dc:creator>
      <dc:date>2007-03-22T03:23:53Z</dc:date>
    </item>
    <item>
      <title>Re: secondary group for the user</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/secondary-group-for-the-user/m-p/3963335#M11848</link>
      <description>Amit,&lt;BR /&gt;&lt;BR /&gt;$ HELP/MESSAGE NOTIDFMT&lt;BR /&gt;&lt;BR /&gt;The identifier name that you specified does not translate to a corresponding value in general identifier format. Identifier name values translate to either general identifier format or UIC format. General identifier names may be 1 through 31 alphanumeric characters and are stored with an integer value in the range of 32,768 to 268,435,455. General identifiers are created by the AUTHORIZE command ADD/IDENTIFIER.&lt;BR /&gt;&lt;BR /&gt;When the AUTHORIZE command GRANT/IDENTIFIER is used, the first identifier specified must be in general identifier format. In other words, a UIC-format identifier cannot be granted to another UIC-format identifier.&lt;BR /&gt;&lt;BR /&gt;Determine why the identifier name is not a general ID. An identifier name and its corresponding value can be displayed with the AUTHORIZE command SHOW/IDENTIFIER. To change the value of an identifier name, use the AUTHORIZE command MODIFY/IDENTIFIER.&lt;BR /&gt;&lt;BR /&gt;cu,&lt;BR /&gt;  Martin</description>
      <pubDate>Thu, 22 Mar 2007 03:33:28 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/secondary-group-for-the-user/m-p/3963335#M11848</guid>
      <dc:creator>Martin Vorlaender</dc:creator>
      <dc:date>2007-03-22T03:33:28Z</dc:date>
    </item>
    <item>
      <title>Re: secondary group for the user</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/secondary-group-for-the-user/m-p/3963336#M11849</link>
      <description>Martin,&lt;BR /&gt;&lt;BR /&gt;I have used the username instead of UIC, but getting same error message.&lt;BR /&gt;&lt;BR /&gt;UAF&amp;gt; grant/identifier LOGIN aphadnis&lt;BR /&gt;%UAF-W-NOTIDFMT, ID name parameter does not translate to ID format&lt;BR /&gt;UAF&amp;gt;&lt;BR /&gt;&lt;BR /&gt;Now how to translate to ID Format. 'aphadnis' is the id-name. &lt;BR /&gt;&lt;BR /&gt;Amit.</description>
      <pubDate>Thu, 22 Mar 2007 03:46:21 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/secondary-group-for-the-user/m-p/3963336#M11849</guid>
      <dc:creator>Amit Phadnis</dc:creator>
      <dc:date>2007-03-22T03:46:21Z</dc:date>
    </item>
  </channel>
</rss>

