Note on usage
Function: Modify admission sets
User group: FTAC user and FTAC administrator
Functional description
ftmoda stands for "modify admission set".
When ftmoda is issued by an FTAC user, it modifies one or more of the settings for basic functions in that user's admission set (MAX. USER LEVELS).
As the FTAC administrator, you can use this command to define settings for the standard admission set and for any admission set of any user in the system. The settings made by the administrator for other users are the MAX. ADM LEVELS.
You can assign a security level of between 0 and 100 for each basic function. These values have the following meanings:
0 | The basic function is locked, i.e. it is not released for any partner system. |
1 to 99 | The basic function is only released for partner systems with the same or a |
100 | The basic function is available for all partner functions. |
For basic functions, consult the table in section "Dependencies concerning inbound file management".
The FTAC or ADM administrator can also use ftmoda to transfer the FTAC administrator privileges or the ADM administrator privileges to other user IDs. The ADM administrator also has the option of returning the ADM administration permission.
Format
ftmoda -h |
[ <user ID> | @s ]
[ -priv=y ]
[ -admpriv=y | -admpriv=n ]
[ -ml=s | -ml=0..100 ]
[ -os=s | -os=0..100 ]
[ -or=s | -or=0..100 ]
[ -is=s | -is=0..100 ]
[ -ir=s | -ir=0..100 ]
[ -ip=s | -ip=0..100 ]
[ -if=s | -if=0..100 ]
Description
-h
Displays the command syntax on the screen. Entries after the -h are ignored.
user ID | @s
Users can enter only their own login names here. @s is not permitted.
As the FTAC administrator, you can specify any login name desired.
@s for user ID
By entering the value @s, the FTAC administrator can modify the standard admission set.
user ID not specified
modifies the admission set of the login name under which ftmoda is entered.
-priv=y
can only be used by the FTAC administrator.
As the FTAC administrator, you can assign administrator privileges to the specified user ID.
-priv not specified
does not change the FTAC administrator.
-admpriv=y | -admpriv=n
The ADM administrator can pass the administration admission to another user ID or return it.
y
Can only be used by the ADM administrator. If you are an ADM administrator, this specification allows you to pass the administration admission for the remote administration server to the user ID specified.
In addition, all profiles defined with -ff=c are forwarded to the new user ID. If profiles with the same name already exist under the new user ID, the command is rejected.
n
With this option the ADM administrator returns the ADM administration permission.
All the profiles defined with -ff=c remain saved but cannot be used, as they cannot be allocated to a valid ADM administrator. The configuration of the remote administration server is retained.
The FTAC administrator can now define a new ADM administrator. As a result, the admission profiles saved for remote administration become active again. They are allocated to the new ADM administrator. It is not necessary to reimport the configuration of the remote administration server.
If there does not yet exist an ADM administrator on the remote administration server, the FTAC administrator has to define the ADM administrator first using -admpriv=. Otherwise the remote administration server cannot be administrated, i.e. the configuration file cannot be imported by means of ftimpc, for example.
-admpriv not specified
does not change the ADM administrator.
-ml=s | -ml=0..100
sets the same value for all six basic functions.
Possible values are:
s
sets each of the basic functions to the value defined in the standard admission set.
0
disables all of the basic functions.
1 to 99
All basic functions are released only for partner systems whose security level is equal to or lower than the specified value.
100
All basic functions are released for all partner systems. For outbound file management functions, no check is made.
-ml not specified
leaves the settings in the admission set unchanged if none of the following entries are made.
-os=s | -os=0..100
sets the value for the basic function outbound send, see below for possible values. outbound send means that requests initiated in your local system send data to a remote system.
-or=s | -or=0..100
sets the value for the basic function outbound receive, see below for possible values. outbound receive means that requests initiated in your local system fetch data from a remote system.
-is=s | -is=0..100
sets the value for the basic function inbound send, see below for possible values. inbound send means that a remote partner system fetches data from your local system.
-ir=s | -ir=0..100
sets the value for the basic function inbound receive, see below for possible values. inbound receive means that a remote partner system sends data to your local system.
-ip=s | -ip=0..100
sets the value for the basic function inbound follow-up processing + preprocessing + postprocessing, see below for possible values. This determines whether or not a remote system may request follow-up, pre- or postprocessing on your local system.
-if=s | -if=0..100
sets the value for the basic function inbound file management, see below for possible values.
Please note that subcomponents of inbound file management are affected by other settings, see section "Dependencies concerning inbound file management".
-os, -or, -is, -ir, -ip or -if not specified
leaves the setting for the respective basic function unchanged.
Possible values for the basic functions
The following values are possible for the individual basic functions (-os, -or, -is, -ir, -ip and -if):
s
The specifications in the default admission record apply to the basic functions.
0
The basic function is locked.
With some basic functions, this can also affect inbound file management components. For details, refer to the table below.
1 to 99
The basic function is only released for partner systems on which the security level is less than or equal to the specified value.
100
The basic function is released for all partner systems.
Dependencies concerning inbound file management
The subcomponent Display file attributes is controlled by the basic function inbound send. In addition, the following dependencies on other settings exist for some components:
Inbound file management | Values of the admission set |
Display file attributes | Inbound Send (IBS) enabled |
Modify file attributes | Inbound Receive (IBR) and |
Rename files | Inbound Receive (IBR) and |
Delete files | Inbound Receive (IBR) enabled and |
Display directories | Inbound File Management (IBF) enabled |
Create, rename and delete | Inbound File Management (IBF) enabled and |
Example
The user Donald wishes to change the admission set for his login name donald to prevent remote systems accessing his login name, while still allowing to send files. This requires that the outbound basic functions be enabled and the inbound basic functions disabled. This can be achieved with the following command:
ftmoda -os=100 -or=100 -is=0 -ir=0 -ip=s -if=0
Donald specifies the value s for the basic function inbound follow-up + preprocessing + postprocessing (-ip option), which refer to the standard admission set, where this basic function is also disabled.