Your Browser is not longer supported

Please use Google Chrome, Mozilla Firefox or Microsoft Edge to view the page correctly
Loading...

{{viewport.spaceProperty.prod}}

Defining access rights for users of remote computers

&pagelevel(3)&pagelevel

If the SECOS software product is used, it is possible to find out for existing BS2000 user IDs whether the user of a remote terminal may obtain access to the system via the rlogin command (see section “Accessing the POSIX shell”). The POSIX-RLOGIN-ACCESS operand is available in the BS2000 commands "SET-LOGON-PROTECTION" and "MODIFY-LOGON-PROTECTION" for this purpose.
The "SHOW-LOGON-PROTECTION" command can be used to display the protection attributes.

Classifying system access control with SECOS

With SECOS, you can classify access from a remote computer more accurately using the commands /SET-LOGON-PROTECTION and /MODIFY-LOGON-PROTECTION.

You can set the following for a user ID:

  • whether and from which stations rlogin access is permitted (POSIX-RLOGIN-ACCESS operand).

  • whether and from which stations access using remote commands (rsh, rcp, ...) is permitted (POSIX-REMOTE-ACCESS operand).

  • whether access using rlogin or remote commands is protected with a guard. Guards can be assigned separately for rlogin and remote command access.

  • whether tasks under this user ID may change their user ID with ufork .