<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: read only access using authorize ? in Operating System - OpenVMS</title>
    <link>https://community.hpe.com/t5/operating-system-openvms/read-only-access-using-authorize/m-p/3768697#M75942</link>
    <description>I see no easy way.  You could, perhaps,&lt;BR /&gt;install AUTHORIZE.EXE with more privileges.&lt;BR /&gt;(AUTHORIZE HELP Files_Used suggests SYSPRV.)&lt;BR /&gt;I assume that this would open up some&lt;BR /&gt;horrible security holes.&lt;BR /&gt;&lt;BR /&gt;It might make more sense to write a more&lt;BR /&gt;limited program to read the SYSUAF, and then&lt;BR /&gt;install that program with the required&lt;BR /&gt;privilege(s), subsystem identifier(s), or&lt;BR /&gt;whatever.&lt;BR /&gt;&lt;BR /&gt;What problem are you trying to solve?</description>
    <pubDate>Mon, 10 Apr 2006 00:24:42 GMT</pubDate>
    <dc:creator>Steven Schweda</dc:creator>
    <dc:date>2006-04-10T00:24:42Z</dc:date>
    <item>
      <title>read only access using authorize ?</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/read-only-access-using-authorize/m-p/3768696#M75941</link>
      <description>Is it possible to provide read only access for a non-priviledged user to run authorize. &lt;BR /&gt;Running $mcr authorize implys read+write access. &lt;BR /&gt;Can this be changed ?&lt;BR /&gt;&lt;BR /&gt;Thanks in advance&lt;BR /&gt;Tom&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Sun, 09 Apr 2006 23:57:12 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/read-only-access-using-authorize/m-p/3768696#M75941</guid>
      <dc:creator>Thomas Ritter</dc:creator>
      <dc:date>2006-04-09T23:57:12Z</dc:date>
    </item>
    <item>
      <title>Re: read only access using authorize ?</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/read-only-access-using-authorize/m-p/3768697#M75942</link>
      <description>I see no easy way.  You could, perhaps,&lt;BR /&gt;install AUTHORIZE.EXE with more privileges.&lt;BR /&gt;(AUTHORIZE HELP Files_Used suggests SYSPRV.)&lt;BR /&gt;I assume that this would open up some&lt;BR /&gt;horrible security holes.&lt;BR /&gt;&lt;BR /&gt;It might make more sense to write a more&lt;BR /&gt;limited program to read the SYSUAF, and then&lt;BR /&gt;install that program with the required&lt;BR /&gt;privilege(s), subsystem identifier(s), or&lt;BR /&gt;whatever.&lt;BR /&gt;&lt;BR /&gt;What problem are you trying to solve?</description>
      <pubDate>Mon, 10 Apr 2006 00:24:42 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/read-only-access-using-authorize/m-p/3768697#M75942</guid>
      <dc:creator>Steven Schweda</dc:creator>
      <dc:date>2006-04-10T00:24:42Z</dc:date>
    </item>
    <item>
      <title>Re: read only access using authorize ?</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/read-only-access-using-authorize/m-p/3768698#M75943</link>
      <description>Steve, the systems are being locked down. A number of groups have work habits whereby they check user records for such items as quotas, last login times and even if the account is enabled. Can be useful. &lt;BR /&gt;I like your idea of a simple replacement program which show one complete user listing. But I would like to avoid the work.</description>
      <pubDate>Mon, 10 Apr 2006 00:28:59 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/read-only-access-using-authorize/m-p/3768698#M75943</guid>
      <dc:creator>Thomas Ritter</dc:creator>
      <dc:date>2006-04-10T00:28:59Z</dc:date>
    </item>
    <item>
      <title>Re: read only access using authorize ?</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/read-only-access-using-authorize/m-p/3768699#M75944</link>
      <description>All I know is what's in the&lt;BR /&gt;freeware_readme.txt, but perhaps DIX could be&lt;BR /&gt;useful:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://h71000.www7.hp.com/freeware/freeware70/dix/" target="_blank"&gt;http://h71000.www7.hp.com/freeware/freeware70/dix/&lt;/A&gt;&lt;BR /&gt;</description>
      <pubDate>Mon, 10 Apr 2006 00:44:56 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/read-only-access-using-authorize/m-p/3768699#M75944</guid>
      <dc:creator>Steven Schweda</dc:creator>
      <dc:date>2006-04-10T00:44:56Z</dc:date>
    </item>
    <item>
      <title>Re: read only access using authorize ?</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/read-only-access-using-authorize/m-p/3768700#M75945</link>
      <description>Tom,&lt;BR /&gt;&lt;BR /&gt;would creating a SYSUAF.LIS file (UAF&amp;gt; LIST */FULL) from a repeating batch job satisfy the need of looking up some user account information from time to time ?&lt;BR /&gt;&lt;BR /&gt;Volker.</description>
      <pubDate>Mon, 10 Apr 2006 00:45:41 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/read-only-access-using-authorize/m-p/3768700#M75945</guid>
      <dc:creator>Volker Halle</dc:creator>
      <dc:date>2006-04-10T00:45:41Z</dc:date>
    </item>
    <item>
      <title>Re: read only access using authorize ?</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/read-only-access-using-authorize/m-p/3768701#M75946</link>
      <description>Thomas,&lt;BR /&gt;if your user group need individual information can simply use f$getjpi lex function.&lt;BR /&gt;I saw dix, there is a good information about sysuaf inside it.&lt;BR /&gt; &lt;BR /&gt;Antonio&lt;BR /&gt;&lt;A href="http://it.openvms.org" target="_blank"&gt;http://it.openvms.org&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Mon, 10 Apr 2006 01:43:01 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/read-only-access-using-authorize/m-p/3768701#M75946</guid>
      <dc:creator>Antoniov.</dc:creator>
      <dc:date>2006-04-10T01:43:01Z</dc:date>
    </item>
    <item>
      <title>Re: read only access using authorize ?</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/read-only-access-using-authorize/m-p/3768702#M75947</link>
      <description>The vms_check tool includes a brief UAF listing in HTML table format, I'm sure you could adapt it to include quota information&lt;BR /&gt;Phil&lt;BR /&gt;&lt;A href="http://h71000.www7.hp.com/openvms/journal/v7/vms_check_tool.html" target="_blank"&gt;http://h71000.www7.hp.com/openvms/journal/v7/vms_check_tool.html&lt;/A&gt;&lt;BR /&gt;</description>
      <pubDate>Mon, 10 Apr 2006 02:36:19 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/read-only-access-using-authorize/m-p/3768702#M75947</guid>
      <dc:creator>Phil.Howell</dc:creator>
      <dc:date>2006-04-10T02:36:19Z</dc:date>
    </item>
    <item>
      <title>Re: read only access using authorize ?</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/read-only-access-using-authorize/m-p/3768703#M75948</link>
      <description>&lt;BR /&gt;Sounds like you have an existing application that you want to disturb as little as possible, whether that application usage of the system makes much sense or not. (It doesn't make much send imho :-).&lt;BR /&gt;&lt;BR /&gt;1) Things like account quota's don't change too often.&lt;BR /&gt;2) AUTHORIZE will follow USER mode logicals, but LOGINOUT will (obviously) only follow trusted logicals.&lt;BR /&gt;&lt;BR /&gt;So perhaps a solution is to point a user mode logical for "sysuaf" to a reasonably up to date copy of the sysuaf file. Just copy (convert/share !) the file daily, or whenever significant changes are known to have been made.&lt;BR /&gt;&lt;BR /&gt;hth,&lt;BR /&gt;Hein.&lt;BR /&gt;</description>
      <pubDate>Mon, 10 Apr 2006 06:46:26 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/read-only-access-using-authorize/m-p/3768703#M75948</guid>
      <dc:creator>Hein van den Heuvel</dc:creator>
      <dc:date>2006-04-10T06:46:26Z</dc:date>
    </item>
    <item>
      <title>Re: read only access using authorize ?</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/read-only-access-using-authorize/m-p/3768704#M75949</link>
      <description>There is the $GETUAI system service, and there is freeware GETUAI utility to get individual fields and users from sysuaf using $GETUAI. &lt;BR /&gt;&lt;BR /&gt;Could the habit of using authorize not be changed to use getuai, which could be installed  with privilege without opening a security hole (at least not too wide) ?&lt;BR /&gt;</description>
      <pubDate>Mon, 10 Apr 2006 07:57:03 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/read-only-access-using-authorize/m-p/3768704#M75949</guid>
      <dc:creator>Joseph Huber_1</dc:creator>
      <dc:date>2006-04-10T07:57:03Z</dc:date>
    </item>
    <item>
      <title>Re: read only access using authorize ?</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/read-only-access-using-authorize/m-p/3768705#M75950</link>
      <description>Well,&lt;BR /&gt;&lt;BR /&gt;to add to (or just explain) the answer by Joseph:&lt;BR /&gt;$GETUAI  needs SYSPRV, so that is no immediate answer, but the freeware GETUAI has already nicely implemented it. Installing THAT with sysprv pretty much gives what you want, and perhaps you could/should restrict of THAT by suitable identifiers.&lt;BR /&gt;&lt;BR /&gt;hth&lt;BR /&gt;&lt;BR /&gt;Proost.&lt;BR /&gt;&lt;BR /&gt;Have one on me (maybe in Nashua?).&lt;BR /&gt;&lt;BR /&gt;jpe</description>
      <pubDate>Mon, 10 Apr 2006 11:51:46 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/read-only-access-using-authorize/m-p/3768705#M75950</guid>
      <dc:creator>Jan van den Ende</dc:creator>
      <dc:date>2006-04-10T11:51:46Z</dc:date>
    </item>
    <item>
      <title>Re: read only access using authorize ?</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/read-only-access-using-authorize/m-p/3768706#M75951</link>
      <description>And the GETUAI utility can be found at process.com fileserver:&lt;BR /&gt;  &lt;A href="http://vms.process.com/fileserv_search.html" target="_blank"&gt;http://vms.process.com/fileserv_search.html&lt;/A&gt;&lt;BR /&gt;Enter GETUAI as the search term.&lt;BR /&gt;</description>
      <pubDate>Tue, 11 Apr 2006 02:16:06 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/read-only-access-using-authorize/m-p/3768706#M75951</guid>
      <dc:creator>Joseph Huber_1</dc:creator>
      <dc:date>2006-04-11T02:16:06Z</dc:date>
    </item>
    <item>
      <title>Re: read only access using authorize ?</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/read-only-access-using-authorize/m-p/3768707#M75952</link>
      <description>GETUAI is not capable of showing the users. It shows you info about a known userid. So, show * is not in it.&lt;BR /&gt;&lt;BR /&gt;Wim</description>
      <pubDate>Tue, 11 Apr 2006 02:37:18 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/read-only-access-using-authorize/m-p/3768707#M75952</guid>
      <dc:creator>Wim Van den Wyngaert</dc:creator>
      <dc:date>2006-04-11T02:37:18Z</dc:date>
    </item>
    <item>
      <title>Re: read only access using authorize ?</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/read-only-access-using-authorize/m-p/3768708#M75953</link>
      <description>Thomas, we have a similar problem here, so I wrote a couple of scripts to allow non-privileged users to read UAF records.&lt;BR /&gt;&lt;BR /&gt;DAYLISTUAF runs in batch with privileges and lists the records.&lt;BR /&gt;&lt;BR /&gt;WHOUAF allows the users to search those listings.&lt;BR /&gt;&lt;BR /&gt;Both are attached.&lt;BR /&gt;&lt;BR /&gt;Rob.&lt;BR /&gt;</description>
      <pubDate>Tue, 11 Apr 2006 03:34:19 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/read-only-access-using-authorize/m-p/3768708#M75953</guid>
      <dc:creator>Robert Atkinson</dc:creator>
      <dc:date>2006-04-11T03:34:19Z</dc:date>
    </item>
    <item>
      <title>Re: read only access using authorize ?</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/read-only-access-using-authorize/m-p/3768709#M75954</link>
      <description>And here</description>
      <pubDate>Tue, 11 Apr 2006 03:34:53 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/read-only-access-using-authorize/m-p/3768709#M75954</guid>
      <dc:creator>Robert Atkinson</dc:creator>
      <dc:date>2006-04-11T03:34:53Z</dc:date>
    </item>
    <item>
      <title>Re: read only access using authorize ?</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/read-only-access-using-authorize/m-p/3768710#M75955</link>
      <description>Tom,&lt;BR /&gt;&lt;BR /&gt;  A quick and dirty way to do what you want...&lt;BR /&gt;&lt;BR /&gt;  First put an ACE on SYSUAF granting READ access to your non-privileged users.&lt;BR /&gt;&lt;BR /&gt;  When they want to read stuff, make a temporary COPY of SYSUAF (with both read and write access), then run AUTHORIZE against it:&lt;BR /&gt;&lt;BR /&gt;READUAF.COM&lt;BR /&gt;$ COPY SYS$SYSTEM:SYSUAF.DAT - &lt;BR /&gt;       SYS$SCRATCH:SYSUAF.DAT&lt;BR /&gt;$ DEFINE/USER SYSUAF SYS$SCRATCH:SYSUAF.DAT&lt;BR /&gt;$ DEFINE/USER SYS$INPUT SYS$COMMAND&lt;BR /&gt;$ MCR AUTHORIZE&lt;BR /&gt;$ DELETE SYS$SCRATCH:SYSUAF.DAT;*&lt;BR /&gt;&lt;BR /&gt;  This won't stop users from issuing AUTHORIZE commands which modify the file, but they'll only be executed against the scratch copy.&lt;BR /&gt;&lt;BR /&gt;  Note that in general it's not a good idea to give people read access to SYSUAF - it gives crackers a head start, as they know what usernames to probe. If you go this path, make sure the scratch copies are also protected from general access, and deleted after use.</description>
      <pubDate>Wed, 12 Apr 2006 00:00:28 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/read-only-access-using-authorize/m-p/3768710#M75955</guid>
      <dc:creator>John Gillings</dc:creator>
      <dc:date>2006-04-12T00:00:28Z</dc:date>
    </item>
    <item>
      <title>Re: read only access using authorize ?</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/read-only-access-using-authorize/m-p/3768711#M75956</link>
      <description>&lt;BR /&gt;Another way that still allows maximum security is to create a CAPTIVE account that is shared by all users under which a menu structure enables them to perform their most common actions. &lt;BR /&gt;&lt;BR /&gt;For instance:&lt;BR /&gt;&lt;BR /&gt;Menu&lt;BR /&gt;&lt;BR /&gt;1. Check account last login&lt;BR /&gt;2. Check account status&lt;BR /&gt;...&lt;BR /&gt;etcetera&lt;BR /&gt;&lt;BR /&gt;The DCL script that runs behind the CAPTIVE account can read the input from the menu, followed by for instance reading the account name and then execute the authorize utility with the appropriate command.&lt;BR /&gt;&lt;BR /&gt;This prevents users from issuing commands within the authorize utility themselves and because of the behavior of the CAPTIVE account they will not be able to break out of the routine.&lt;BR /&gt;</description>
      <pubDate>Wed, 12 Apr 2006 01:58:13 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/read-only-access-using-authorize/m-p/3768711#M75956</guid>
      <dc:creator>Dave Laurier</dc:creator>
      <dc:date>2006-04-12T01:58:13Z</dc:date>
    </item>
    <item>
      <title>Re: read only access using authorize ?</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/read-only-access-using-authorize/m-p/3768712#M75957</link>
      <description>An example of a script that can be run under the CAPTIVE account in order to permit non-priviledged users to execute priviledged account management operations.&lt;BR /&gt;</description>
      <pubDate>Tue, 18 Apr 2006 03:06:56 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/read-only-access-using-authorize/m-p/3768712#M75957</guid>
      <dc:creator>Dave Laurier</dc:creator>
      <dc:date>2006-04-18T03:06:56Z</dc:date>
    </item>
    <item>
      <title>Re: read only access using authorize ?</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/read-only-access-using-authorize/m-p/3768713#M75958</link>
      <description>If You want to avoid specialized/captive accounts or batch jobs listing sysuaf to a common location, have a look into this program&lt;BR /&gt; &lt;A href="http://wwwvms.mppmu.mpg.de/vmssig/src/for/last_login.for" target="_blank"&gt;http://wwwvms.mppmu.mpg.de/vmssig/src/for/last_login.for&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;It shows how to loop over all accounts (SYS$IDTOASC) and $getuai to extract whatever info.&lt;BR /&gt;&lt;BR /&gt;The $idtoasc call is the key to wildcard $getuai.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 18 Apr 2006 04:45:31 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/read-only-access-using-authorize/m-p/3768713#M75958</guid>
      <dc:creator>Joseph Huber_1</dc:creator>
      <dc:date>2006-04-18T04:45:31Z</dc:date>
    </item>
    <item>
      <title>Re: read only access using authorize ?</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/read-only-access-using-authorize/m-p/3768714#M75959</link>
      <description>Hi Thomas&lt;BR /&gt;&lt;BR /&gt;It may not assist you in your current task but the attached file was used to allow Rdb users (with access to the stored function) access to a user's default directory.&lt;BR /&gt;&lt;BR /&gt;FWIW.&lt;BR /&gt;&lt;BR /&gt;Cheers Richard Maher&lt;BR /&gt;</description>
      <pubDate>Sun, 30 Apr 2006 05:30:42 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/read-only-access-using-authorize/m-p/3768714#M75959</guid>
      <dc:creator>Richard J Maher</dc:creator>
      <dc:date>2006-04-30T05:30:42Z</dc:date>
    </item>
    <item>
      <title>Re: read only access using authorize ?</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/read-only-access-using-authorize/m-p/3768715#M75960</link>
      <description>Hi (again) Thomas,&lt;BR /&gt;&lt;BR /&gt;Having said that, Stephen Hoffman (of VMS engineering) says: - &lt;BR /&gt;&lt;BR /&gt;1) "It's unsupported to call anything outside the kernel from inner-mode code."&lt;BR /&gt;&lt;BR /&gt;2) If it's loaded and activated separately or otherwise not part of the kernel, it's not necessarily safe to call it from inner-mode&lt;BR /&gt;&lt;BR /&gt;3) And in any event, inner-mode code cannot call RTL calls.&lt;BR /&gt;&lt;BR /&gt;4) You can't call RTLs from inner-mode code.&lt;BR /&gt;&lt;BR /&gt;5) You can't call user-mode code and user-mode RTLs from inner-mode code.&lt;BR /&gt;&lt;BR /&gt;6) You can't call user-mode code from inner-mode code.&lt;BR /&gt;&lt;BR /&gt;7) And AFAIK, it is not safe to call sys$getuai, since this call is&lt;BR /&gt;implemented as a UWSS and not as part of the kernel -- the LOADSS calls&lt;BR /&gt;needed to use outer-mode APIs as part of their operations, so the LOADSS&lt;BR /&gt;APIs are not directly part of the kernel.)&lt;BR /&gt;*****************************&lt;BR /&gt;&lt;BR /&gt;Now, my name's Richard Maher and I say that on this particular subject Stephen Hoffman is talking crap. (This will inevitably trigger another sycophantic ITRC no-hoper to delete this entry, but hey, what can you do?&lt;BR /&gt;&lt;BR /&gt;Regards Richard Maher&lt;BR /&gt;&lt;BR /&gt;PS. See attached example of accessing SYSUAF directly if you believe Hoff.&lt;BR /&gt;&lt;BR /&gt;PPS. Ask Hein what he thinks.</description>
      <pubDate>Sun, 30 Apr 2006 05:49:36 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/read-only-access-using-authorize/m-p/3768715#M75960</guid>
      <dc:creator>Richard J Maher</dc:creator>
      <dc:date>2006-04-30T05:49:36Z</dc:date>
    </item>
  </channel>
</rss>

