<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Rasising Security Level within a DCL Scripts in Operating System - OpenVMS</title>
    <link>https://community.hpe.com/t5/operating-system-openvms/rasising-security-level-within-a-dcl-scripts/m-p/5006587#M79330</link>
    <description>&lt;!--!*#--&gt;These are all good answers, but let me explain what I am trying to do and perhaps someone can suggest an alternative. &lt;BR /&gt;&lt;BR /&gt;I will be responsible for an OpenVMS system that is being run in an ASP environment. I want to give customer users access to perform certain basic administrative tasks (so I do not have to do them) such as reset passwords.&lt;BR /&gt; &lt;BR /&gt;The problem is I do not want these users to have any more rights than necessary and I do not want them to have access to the system prompt. I am working to create a menu system to allow these customer users to perform certain basic admin functions but I would like to keep them at a minimal security level. &lt;BR /&gt;&lt;BR /&gt;This is why I wanted to know if there was a way to reaise security level within a DCL. However, if someone has a better alternative I am all ears. &lt;BR /&gt;</description>
    <pubDate>Wed, 04 Oct 2006 12:21:03 GMT</pubDate>
    <dc:creator>HarrinG</dc:creator>
    <dc:date>2006-10-04T12:21:03Z</dc:date>
    <item>
      <title>Rasising Security Level within a DCL Scripts</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/rasising-security-level-within-a-dcl-scripts/m-p/5006583#M79326</link>
      <description>I have a DCL that will allow a selected set of users to reset passwords, but I do not want those users to have the rights to actually run authorize. Is there a way within the DCL to allow access to authorize then remove it when the DCL is completed?</description>
      <pubDate>Tue, 03 Oct 2006 14:24:11 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/rasising-security-level-within-a-dcl-scripts/m-p/5006583#M79326</guid>
      <dc:creator>HarrinG</dc:creator>
      <dc:date>2006-10-03T14:24:11Z</dc:date>
    </item>
    <item>
      <title>Re: Rasising Security Level within a DCL Scripts</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/rasising-security-level-within-a-dcl-scripts/m-p/5006584#M79327</link>
      <description>The following sequence is what I do to temporarily *downgrade* privs to only the ones I need for a particular operation and then restore them to what they were after I'm done.  You could do something similar to temporarily elevate privs (assuming the user has SETPRV), but be sure you are trapping interrupts and there are no unhandled errors that could drop people out to the command prompt in an elevated privilege state, and be sure you have no other reason to disallow SETPRV.  In other words, this procedure only makes sense as a way to automate what a privileged user should already be doing manually.&lt;BR /&gt;&lt;BR /&gt;$ oldpriv = F$SetPrv("NOALL")      ! downgrade privs for safety&lt;BR /&gt;$ discard = F$SetPrv("NETMBX,TMPMBX") ! only need these &lt;BR /&gt;&lt;BR /&gt;. . . do stuff&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;$ If f$type(oldpriv) .nes. "" Then discard = F$SetPrv(oldpriv)&lt;BR /&gt;</description>
      <pubDate>Tue, 03 Oct 2006 16:26:30 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/rasising-security-level-within-a-dcl-scripts/m-p/5006584#M79327</guid>
      <dc:creator>Craig A Berry</dc:creator>
      <dc:date>2006-10-03T16:26:30Z</dc:date>
    </item>
    <item>
      <title>Re: Rasising Security Level within a DCL Scripts</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/rasising-security-level-within-a-dcl-scripts/m-p/5006585#M79328</link>
      <description>HarrinG,&lt;BR /&gt;&lt;BR /&gt;  There are ways to do this (ie: turn privileges on or off) in DCL using installed images, but typically they open some fairly serious security holes in the system itself.&lt;BR /&gt;&lt;BR /&gt;  You can do precisely what you want with a program which calls $SETUAI to reset the password of a given username. Install it with SYSPRV privilege and protect it with an ACL which grants EXECUTE access only to holders of a specific identifier. The code should also have an exclusion list of some type to prevent the user from changing passwords for critical accounts (eg: SYSTEM). A more generic mechanism might be to take the target username, use $GETUAI to check the privileges of the username and refuse to change the password of anyone with more privileges than the user.</description>
      <pubDate>Tue, 03 Oct 2006 18:49:24 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/rasising-security-level-within-a-dcl-scripts/m-p/5006585#M79328</guid>
      <dc:creator>John Gillings</dc:creator>
      <dc:date>2006-10-03T18:49:24Z</dc:date>
    </item>
    <item>
      <title>Re: Rasising Security Level within a DCL Scripts</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/rasising-security-level-within-a-dcl-scripts/m-p/5006586#M79329</link>
      <description>HarrinG,&lt;BR /&gt;&lt;BR /&gt;To start with:&lt;BR /&gt;&lt;BR /&gt;WELCOME to the VMS Forum!&lt;BR /&gt;&lt;BR /&gt;What we have for this (although I guess John will have some objections) is a very small  program, which essentially does:&lt;BR /&gt;TRNLNM from execmode in LNM$SYSTEM (covers both LNM$SYSTEM_TABLE and LNM$SYSCLUSTER_TABLE, but no more)&lt;BR /&gt;&lt;BR /&gt;CALL LIB$SPAWN with the translated value (but only IF it translates!)&lt;BR /&gt;&lt;BR /&gt;For each DCL script we need to activate with additional privs, we create a new LNM and a corresponding .EXE.&lt;BR /&gt;&lt;BR /&gt;Instal the image with the required privs, and put the script in a W:(noaccess) environment.&lt;BR /&gt;Create an identifier dedicated to this script, and set an ACL on image &amp;amp; script to allow EXECUTE access.&lt;BR /&gt;&lt;BR /&gt;In the .COM do the validations that can be done unpriv'd, f$priv the privs that are now authorised by inheritance from the image, perform any validations that require privs, execute the intended privd action, and Logout from the subprocess.&lt;BR /&gt;&lt;BR /&gt;It LOOKS quite complicated, but actually, it is VERY convenient, and at least has MUCH tighter security than other options I have met so far.&lt;BR /&gt;&lt;BR /&gt;BTW: kudos for this AFAIK go to my compatriot Frits Storms.&lt;BR /&gt;&lt;BR /&gt;hth,&lt;BR /&gt;&lt;BR /&gt;Proost.&lt;BR /&gt;&lt;BR /&gt;Have one on me.&lt;BR /&gt;&lt;BR /&gt;jpe</description>
      <pubDate>Wed, 04 Oct 2006 11:48:58 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/rasising-security-level-within-a-dcl-scripts/m-p/5006586#M79329</guid>
      <dc:creator>Jan van den Ende</dc:creator>
      <dc:date>2006-10-04T11:48:58Z</dc:date>
    </item>
    <item>
      <title>Re: Rasising Security Level within a DCL Scripts</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/rasising-security-level-within-a-dcl-scripts/m-p/5006587#M79330</link>
      <description>&lt;!--!*#--&gt;These are all good answers, but let me explain what I am trying to do and perhaps someone can suggest an alternative. &lt;BR /&gt;&lt;BR /&gt;I will be responsible for an OpenVMS system that is being run in an ASP environment. I want to give customer users access to perform certain basic administrative tasks (so I do not have to do them) such as reset passwords.&lt;BR /&gt; &lt;BR /&gt;The problem is I do not want these users to have any more rights than necessary and I do not want them to have access to the system prompt. I am working to create a menu system to allow these customer users to perform certain basic admin functions but I would like to keep them at a minimal security level. &lt;BR /&gt;&lt;BR /&gt;This is why I wanted to know if there was a way to reaise security level within a DCL. However, if someone has a better alternative I am all ears. &lt;BR /&gt;</description>
      <pubDate>Wed, 04 Oct 2006 12:21:03 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/rasising-security-level-within-a-dcl-scripts/m-p/5006587#M79330</guid>
      <dc:creator>HarrinG</dc:creator>
      <dc:date>2006-10-04T12:21:03Z</dc:date>
    </item>
    <item>
      <title>Re: Rasising Security Level within a DCL Scripts</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/rasising-security-level-within-a-dcl-scripts/m-p/5006588#M79331</link>
      <description>HarrinG,&lt;BR /&gt;     I've used (and like a lot) a tool called PRIVDCL.&lt;BR /&gt;     It does almost exactly what you are asking, after installing the tool's main executable with privilege, it lets you flexibly (via config file) control who gets the ability to run a certain DCL command procedure with the specified elevated privileges (albeit in a subprocess). &lt;BR /&gt;     Provided you are careful writing the command procedure I believe it leads to a more secure system than without it, as you can allow people to do very specific tasks and not just grant them SYSPRV all the time, for instance.&lt;BR /&gt;     It can be found at your favorite VMS public domain software ftp site, such as:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.tmk.com/ftp/vms-freeware/fileserv/privdcl.zip" target="_blank"&gt;http://www.tmk.com/ftp/vms-freeware/fileserv/privdcl.zip&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;It is originally at:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="ftp://ftp.lawrence.edu/public/UTILITIES/PRIVDCL.ZIP" target="_blank"&gt;ftp://ftp.lawrence.edu/public/UTILITIES/PRIVDCL.ZIP&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Later,&lt;BR /&gt;Dave</description>
      <pubDate>Fri, 06 Oct 2006 10:31:01 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/rasising-security-level-within-a-dcl-scripts/m-p/5006588#M79331</guid>
      <dc:creator>Dave Lennon</dc:creator>
      <dc:date>2006-10-06T10:31:01Z</dc:date>
    </item>
    <item>
      <title>Re: Rasising Security Level within a DCL Scripts</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/rasising-security-level-within-a-dcl-scripts/m-p/5006589#M79332</link>
      <description>PRIVDCL might be the answer I am looking for. As I indicated the key is to give the users the right to do things within the DCL menu but not once they leave.</description>
      <pubDate>Fri, 06 Oct 2006 10:36:59 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/rasising-security-level-within-a-dcl-scripts/m-p/5006589#M79332</guid>
      <dc:creator>HarrinG</dc:creator>
      <dc:date>2006-10-06T10:36:59Z</dc:date>
    </item>
    <item>
      <title>Re: Rasising Security Level within a DCL Scripts</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/rasising-security-level-within-a-dcl-scripts/m-p/5006590#M79333</link>
      <description>Thanks all for the comments and suggestions. There were some good ideas here, Appreciate the assistance</description>
      <pubDate>Fri, 06 Oct 2006 10:39:05 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/rasising-security-level-within-a-dcl-scripts/m-p/5006590#M79333</guid>
      <dc:creator>HarrinG</dc:creator>
      <dc:date>2006-10-06T10:39:05Z</dc:date>
    </item>
  </channel>
</rss>

