If the SECOS software product is used, it is possible to find out for existing BS2000 user IDs whether the user of a remote terminal may obtain access to the system via the rlogin command (see section “Accessing the POSIX shell”). The POSIX-RLOGIN-ACCESS operand is available in the BS2000 commands "SET-LOGON-PROTECTION" and "MODIFY-LOGON-PROTECTION" for this purpose.
The "SHOW-LOGON-PROTECTION" command can be used to display the protection attributes.
Classifying system access control with SECOS
With SECOS, you can classify access from a remote computer more accurately using the commands /SET-LOGON-PROTECTION and /MODIFY-LOGON-PROTECTION.
You can set the following for a user ID:
whether and from which stations rlogin access is permitted (POSIX-RLOGIN-ACCESS operand).
whether and from which stations access using remote commands (rsh, rcp, ...) is permitted (POSIX-REMOTE-ACCESS operand).
whether access using rlogin or remote commands is protected with a guard. Guards can be assigned separately for rlogin and remote command access.
whether tasks under this user ID may change their user ID with ufork .