SENTRY The Integrated Security System Release 4 User Guide Fitzgerald & Long 12341 E. Cornell Avenue, #18 Aurora, Colorado 800
Introduction - 6 SENTRY User’s Guide Fitzgerald & Long 6. Notice a file named "install". This is a script which will perform the
Section 4 - 10 SENTRY User’s Guide Fitzgerald & Long 4.4 REBUILD CROSS REFERENCE FILES SENTRY maintains a number of traditional inverted li
SENTRY User’s Guide Section 4 - 11 Fitzgerald & Long 4.5 UPDATE PROTECTED COMMANDS UPDATE.VOC Command Update
SENTRY User’s Guide Appendix 1 - 1 Fitzgerald & Long APPENDIX 1 SENTRY INTERNAL SUBROUTINES NOTICE The subroutines documented in this appe
Appendix 1 - 2 SENTRY User’s Guide Fitzgerald & Long This is the result of the encryption. If the data string is already encrypted and the e
SENTRY User’s Guide Appendix 1 - 3 Fitzgerald & Long WRITE CRYPT.DATA ON FILE.VAR, REC.KEY DISPLAY.DECRYPTED SENTRY.ENCRYPT
Appendix 1 - 4 SENTRY User’s Guide Fitzgerald & Long ERROR.TEXT = “””” CALL @SENTRY.USER.ITEM.CONTROL(USER.ITEM, ITEM. FOUND, ACCESS.RI
SENTRY User’s Guide Appendix 1 - 5 Fitzgerald & Long If an error was encountered by the subroutine, an error message will be returned. If no
Appendix 1 - 6 SENTRY User’s Guide Fitzgerald & Long Subroutine: SENTRY.VIOLATION.STAMP SENTRY.VIOLATION.STAMP is used to log access violat
SENTRY User’s Guide Appendix 1 - 7 Fitzgerald & Long
SENTRY User’s Guide Introduction - 7 Fitzgerald & Long SENTRY Main Menu 07 AUG 2000 1
SENTRY User’s Guide Appendix 2 - 1 Fitzgerald & Long APPENDIX 2 SENTRY KEY BINDINGS A record called "KEY.BINDINGS" in the SENTRY
Appendix 2 - 2 SENTRY User’s Guide Fitzgerald & Long environment and reenter SENTRY in order for the changes to take effect because these var
SENTRY User’s Guide Appendix 2 - 3 Fitzgerald & Long
Introduction - 8 SENTRY User’s Guide Fitzgerald & Long GETTING STARTED This section describes how to invoke the SENTRY Main Menu. It also d
SENTRY User’s Guide Introduction - 9 Fitzgerald & Long Our recommendation is that you create a userid called sentry with the UID of 0 (zero).
Introduction - 10 SENTRY User’s Guide Fitzgerald & Long This is a safety precaution. SENTRY is a very powerful tool and should only be used
SENTRY User’s Guide Introduction - 11 Fitzgerald & Long wish to send the report to a specific printer, form or destination use the SETPTR com
Introduction - 12 SENTRY User’s Guide Fitzgerald & Long INTRODUCING THE MAIN MENU SENTRY'S Main Menu follows the copyright screen and t
SENTRY User’s Guide Introduction - 13 Fitzgerald & Long The first selection, Database Creation and Validation Menu offers access to programs
SENTRY User’s Guide Section 1 - 1 Fitzgerald & Long 1. INTRODUCING THE DATABASE CREATION AND VALIDATION MENU The first selection of SE
NOTICE The information contained in this guide is subject to change without notice. Fitzgerald & Long, Inc. shall not be liable for technical o
Section 1 - 2 SENTRY User’s Guide Fitzgerald & Long 1.0 DATABASE CREATION AND VALUDATION MENU This is the first submenu accessible from SEN
SENTRY User’s Guide Section 1 - 3 Fitzgerald & Long
Section 1 - 4 SENTRY User’s Guide Fitzgerald & Long 1.1 UPLOAD USER AND GROUP PROFILES FROM UNIX This program loads the data from the UNIX
SENTRY User’s Guide Section 1 - 5 Fitzgerald & Long We recommend: Upload the passwd and group files into the SENTRY databases on a regular b
Section 1 - 6 SENTRY User’s Guide Fitzgerald & Long 1.2 CREATE DATABASE FROM FILE SYSTEM This section describes the program which create th
SENTRY User’s Guide Section 1 - 7 Fitzgerald & Long 1.3 VALIDATE THE USER PROFILE DATABASE This program is used to check the consistency of
Section 1 - 8 SENTRY User’s Guide Fitzgerald & Long This program will generate a printed report, using whatever printer setup is in effect at
SENTRY User’s Guide Section 1 - 9 Fitzgerald & Long 3. “Password for User XXXXX is less than N characters.” - The user “XXXXX” has a pas
Section 1 - 10 SENTRY User’s Guide Fitzgerald & Long 5. “Group (GID) XXXXX on /ZZZZZ does not exist.” - The group number “XXXXX” is the reg
SENTRY User’s Guide Section 1 - 11 Fitzgerald & Long
Table Of Contents USING THIS GUIDE---------------------------------------------------------------------------------------- Intro - 1 USING THE SCREENS
SENTRY User’s Guide Section 2 - 1 Fitzgerald & Long 2. INTRODUCING THE DATABASE MAINTENANCE MENU The second selection on SENTRY's
Section 2 - 2 SENTRY User’s Guide Fitzgerald & Long 2.0 DATABASE MAINTENANCE This is the second sub-menu accessible from SENTRY’s Main Menu
SENTRY User’s Guide Section 2 - 3 Fitzgerald & Long 4. File System. This entry allows you to scroll through your UNIX tree structure much
Section 2 - 4 SENTRY User’s Guide Fitzgerald & Long 2.1 SYSTEM PROFILE MAINTENANCE This data entry program is used to display and change th
SENTRY User’s Guide Section 2 - 5 Fitzgerald & Long 1. Null Passwords Allowed - The default of this field is “N”. When set to “N”o, each
Section 2 - 6 SENTRY User’s Guide Fitzgerald & Long • Each password must contain at least two alphabetic characters and at least one numeric
SENTRY User’s Guide Section 2 - 7 Fitzgerald & Long However, we recommend using UIDs smaller than 5 digits simply to make them easier to read
Section 2 - 8 SENTRY User’s Guide Fitzgerald & Long Note that the indexing occurs at the time that the “Create Database from File System” pro
SENTRY User’s Guide Section 2 - 9 Fitzgerald & Long 1. Minimum password change (days): Enter the number of days before a user is allowed to
Section 2 - 10 SENTRY User’s Guide Fitzgerald & Long 2.2 USER MAINTENANCE This data entry program is used to display, change, and delete us
SENTRY User’s Guide Section 2 - 11 Fitzgerald & Long SENTRY database using the user’s name, enter “@” followed by the first or last name of t
Section 2 - 12 SENTRY User’s Guide Fitzgerald & Long configured (through the System Profile screen) to generate alphanumeric passwords, which
SENTRY User’s Guide Section 2 - 13 Fitzgerald & Long 8. Command - This field normally defines the startup UNIX shell the user invokes. The
Section 2 - 14 SENTRY User’s Guide Fitzgerald & Long new password for 90 days before he was forced by UNIX to enter a new password. This is
SENTRY User’s Guide Section 2 - 15 Fitzgerald & Long To exit you must save your changes by entering “F”. If you make no changes or wish to ca
Section 2 - 16 SENTRY User’s Guide Fitzgerald & Long /jaf Enter "<ESC>" to quit : Figure 17 - This is an example of
SENTRY User’s Guide Section 2 - 17 Fitzgerald & Long D) Do not delete this user. This option allows the user to return to the main User M
Section 2 - 18 SENTRY User’s Guide Fitzgerald & Long 2.3 GROUP MAINTENANCE Through this data entry program you may add and delete groups fr
SENTRY User’s Guide Section 2 - 19 Fitzgerald & Long 2. GID - This is the number assigned to this group name. You may use “@” for a list of
SENTRY User’s Guide Introduction - 1 Fitzgerald & Long USING THIS GUIDE The SENTRY User's Guide is comprehensive in its descriptions of
Section 2 - 20 SENTRY User’s Guide Fitzgerald & Long In UNIX every file has an owner and a group. The references to owners and groups are th
SENTRY User’s Guide Section 2 - 21 Fitzgerald & Long GROUP.MAINT Group Maintenance 08/14/00 Files o
Section 2 - 22 SENTRY User’s Guide Fitzgerald & Long D) Do not delete this group. This option allows the user to return to the main Group M
SENTRY User’s Guide Section 2 - 23 Fitzgerald & Long 2.4 FILE SYSTEM With this program you may change owners, groups and the permissions fo
Section 2 - 24 SENTRY User’s Guide Fitzgerald & Long FILE.MANAGER General File Utility 16:24:02 07 AUG 2000 CURSOR.
SENTRY User’s Guide Section 2 - 25 Fitzgerald & Long One of the most valuable functions of this program is the ability to find files and dire
Section 2 - 26 SENTRY User’s Guide Fitzgerald & Long FILE.MAINT Detailed File View 08/08/00 File
SENTRY User’s Guide Section 2 - 27 Fitzgerald & Long In the lower half of the screen the file owner, group and permissions are displayed. Yo
Section 2 - 28 SENTRY User’s Guide Fitzgerald & Long ACLs Maintenance Access Control Lists (ACLs) are an extension the standard UNIX file pe
SENTRY User’s Guide Section 2 - 29 Fitzgerald & Long This is an example of the “ACL Maintenance Screen”. Not all UNIX systems support ACLs.
Introduction - 2 SENTRY User’s Guide Fitzgerald & Long PI/open the command prompt is indicated by a colon “:” while for uniVerse the prompt i
Section 2 - 30 SENTRY User’s Guide Fitzgerald & Long
SENTRY User’s Guide Section 2 - 31 Fitzgerald & Long The next field “3. Permissions” consists of three sets of three permissions. In our ex
Section 2 - 32 SENTRY User’s Guide Fitzgerald & Long the user is not the owner and not a member of the group associated with a file, the perm
SENTRY User’s Guide Section 2 - 33 Fitzgerald & Long FILE.MANAGER General File Utility 14:39:56 18 AUG 2000
Section 2 - 34 SENTRY User’s Guide Fitzgerald & Long 2.5 COMMAND MAINTENANCE This program is used to update protection of VOC items in uniV
SENTRY User’s Guide Section 2 - 35 Fitzgerald & Long To execute this program, select 2. Database Maintenance Menu from SENTRY's Main Me
Section 2 - 36 SENTRY User’s Guide Fitzgerald & Long X - Execute from inside a program only UX - Both use at database prompt and from
SENTRY User’s Guide Section 2 - 37 Fitzgerald & Long Enter Field Number, "F"ile, "DEL"ete or <ESC> to Exit: - This
Section 2 - 38 SENTRY User’s Guide Fitzgerald & Long 2.6 USER ITEM PROTECTION MAINTENANCE This is a special SENTRY feature which allows you
SENTRY User’s Guide Section 2 - 39 Fitzgerald & Long To execute this program, select 2. Database Maintenance Menu from SENTRY's Main Me
SENTRY User’s Guide Introduction - 3 Fitzgerald & Long USING THE SCREENS SENTRY data entry screens feature some very helpful functions. The
Section 2 - 40 SENTRY User’s Guide Fitzgerald & Long 5. Groups - This is a input window used to enter the groups associated with this User
SENTRY User’s Guide Section 2 - 41 Fitzgerald & Long To save changes you have made to the User Items, enter "F" to file. After fil
Section 2 - 42 SENTRY User’s Guide Fitzgerald & Long Enter Line # of Groups (or Users) (1-N), "A"dd, "F"orward or "B
SENTRY User’s Guide Section 3 - 1 Fitzgerald & Long 3. INTRODUCING THE REPORTS MENU The third selection on SENTRY's Main Menu is 3. Re
Section 3 - 2 SENTRY User’s Guide Fitzgerald & Long 3.0 REPORTS MENU This is the third submenu accessible from SENTRY's Main Menu. A
SENTRY User’s Guide Section 3 - 3 Fitzgerald & Long Selection five Command Protection, is the same information as selection four except the
Section 3 - 4 SENTRY User’s Guide Fitzgerald & Long 3.1 SYSTEM PROFILE REPORT Selection one, System Profile, generates a report detailing
SENTRY User’s Guide Section 3 - 5 Fitzgerald & Long Minimum Password Length - This is a UNIX defined parameter as well as one used by SENTRY
Section 3 - 6 SENTRY User’s Guide Fitzgerald & Long embedded numeric. The default and recommended value is ALPHA which will generate a strin
SENTRY User’s Guide Section 3 - 7 Fitzgerald & Long Maximum user ID Length - This field contains a number defining the maximum number of ch
Introduction - 4 SENTRY User’s Guide Fitzgerald & Long Data Entry Conventions Underscore/underline When awaiting data, the cursor is posit
Section 3 - 8 SENTRY User’s Guide Fitzgerald & Long Punct for File Indexing - SENTRY builds B-trees to provide rapid cross referencing into
SENTRY User’s Guide Section 3 - 9 Fitzgerald & Long 3.2 USER PROFILES The SENTRY User Profile Report displays all parameters in effect for
Section 3 - 10 SENTRY User’s Guide Fitzgerald & Long UID - UNIX maintains a relationship between users and files by assigning ownership via
SENTRY User’s Guide Section 3 - 11 Fitzgerald & Long 3.3 GROUPS REPORT The SENTRY Groups Report displays, in a very concise format, all dat
Section 3 - 12 SENTRY User’s Guide Fitzgerald & Long GID for Users - The users listed in this field are assigned this group in the passwd fi
SENTRY User’s Guide Section 3 - 13 Fitzgerald & Long 3.4 ACCOUNT PROTECTION REPORT This is a report of all protected commands on your syste
Section 3 - 14 SENTRY User’s Guide Fitzgerald & Long Description - The description field is used for documentation and may be entered throug
SENTRY User’s Guide Section 3 - 15 Fitzgerald & Long 3.5 COMMAND PROTECTION REPORT The SENTRY Command Protection Report presents an alphabe
Section 3 - 16 SENTRY User’s Guide Fitzgerald & Long Group Name & Rights - This field displays the names of groups (if any) used to defi
SENTRY User’s Guide Section 3 - 17 Fitzgerald & Long 3.6 ACCESS VIOLATIONS REPORT The SENTRY Access Violations Report is an audit report of
SENTRY User’s Guide Introduction - 5 Fitzgerald & Long INSTALLING SENTRY Installing the SENTRY software is very simple! Just follow these ea
Section 3 - 18 SENTRY User’s Guide Fitzgerald & Long Pathname - This is the pathname to the account containing the protected VOC item which w
SENTRY User’s Guide Section 4 - 1 Fitzgerald & Long 4. INTRODUCING THE UTILITIES MENU The Utilities Menu is executed through selection four
Section 4 - 2 SENTRY User’s Guide Fitzgerald & Long 4.0 UTILITIES MENU This menu provides access to five utility programs designed to save
SENTRY User’s Guide Section 4 - 3 Fitzgerald & Long Selection four, Rebuild SENTRY Cross Reference Files. Sentry maintains a number of trad
Section 4 - 4 SENTRY User’s Guide Fitzgerald & Long 4.1 VOC PROTECTION SETUP This program provides the convenience of being able to copy th
SENTRY User’s Guide Section 4 - 5 Fitzgerald & Long 4.2 PUGING THE VIOLATIONS LOG This program provides a convenient method of selectively
Section 4 - 6 SENTRY User’s Guide Fitzgerald & Long This program is constructing a query sentence to SELECT the items to be purged. When ent
SENTRY User’s Guide Section 4 - 7 Fitzgerald & Long 4.3 PASSWORD CREATION This program provides a convenient utility to assist you in creat
Section 4 - 8 SENTRY User’s Guide Fitzgerald & Long MM/DD/YY. Sentry will select all users whose password update date is earlier than this d
SENTRY User’s Guide Section 4 - 9 Fitzgerald & Long 4. Department - If you have entered data into the “department” field of the SENTRY.USERS
Kommentare zu diesen Handbüchern