DTRHELP.HLB  —  ACL  Identification
       The user identification criteria form the first part of an ACL
       entry. The user identification criteria determine the user or
       class of users to whom the entry applies. The dictionary compares
       the user identification criteria with the characteristics of the
       user's process and with any passwords appended to the given name
       of the object or directory.

       An ACL on a directory or object in the DMU format dictionary
       can identify you by your username, your UIC (User Identification
       Code), a password, your terminal number or job class.

       An ACL on a CDO format dictionary or object can identify you by
       your username, your UIC (User Identification Code), or your job
       class.

       In an ACL entry, you can specify one option from each available
       category. You can include one username, one UIC, one password
       (DMU only), and one terminal number (DMU only) or job class. You
       must include at least one user identification criterion per ACL
       entry.

1  –  Password

       You can also specify a password as an identification criterion
       in an ACL entry on a directory or object in the DMU format
       dictionary. If an ACL entry for a directory or object in the
       dictionary defines a password, the password can be specified
       as part of the given name of the directory or object. Using
       a password identifies the user or group of users who know the
       password.

1.1  –  Examples

       When you need the access privileges to a directory or object
       granted by an ACL entry containing a password, you can specify
       the password in two ways:

       o  You can enter the password, enclosed in parentheses, after the
          given name of the directory or object:

          -  With only the given name:

                     YACHTS;1(SAILOR)

          -  In a full dictionary path name:

              CDD$TOP.INVENTORY(SECRET).YACHTS;1(SAILOR)

       o  You can also enter an asterisk in parentheses after the given
          name of the directory or object. This asterisk in place of the
          password causes DEC DATATRIEVE to prompt you for the password.
          When you respond, DEC DATATRIEVE does not echo the characters
          on your terminal. This prompting protects your password and,
          as a result, your data and data definitions:

          -  In place of the password in parentheses, enter (_*):

              DTR> SHOWP YACHTS (_*)

          -  DEC DATATRIEVE responds with a prompt for the password:

              Enter password for YACHTS:

2  –  Terminal

       You can also identify users by their terminal line numbers
       (DMU format dictionary only) or their job class (either format
       dictionary):

       o  In an ACL entry on an object or directory in the DMU format
          dictionary you can identify users who work from a particular
          terminal line. You specify the terminal number in the format
          TTnn[:]. For example:

              TERMINAL = TTH6

       o  You can identify all users whose terminal lines are hard-wired
          to your local system. Use the keyword LOCAL:

              TERMINAL = LOCAL

       o  You can identify all users whose processes are running on
          anything other than a hard-wired line. By using the keyword
          NONLOCAL you can identify all processes using dial-up lines,
          running in batch mode, using DECnet and running as remote
          terminals, and using the Distributed Data Manipulation
          Facility (DDMF) to run DEC DATATRIEVE from a remote node in
          a network of Digital computers. For example:

              TERMINAL = NONLOCAL

       o  You can identify all batch processes by using the keyword
          BATCH:

              TERMINAL = BATCH

       o  You can identify all processes using DDMF to run DEC
          DATATRIEVE from a remote node in a network of Digital
          computers. Use the keyword NETWORK:

              TERMINAL = NETWORK

3  –  UIC

       The UIC (User Identification Code) is a 2-part number or
       text string that identifies a user and determines his or her
       relationship to other users on the system. The UIC determines the
       ownership of files and is assigned by your system manager. UICs
       can be either numeric or alphanumeric:

       o  A numeric UIC consists of an octal group number and an octal
          member number.

          You can use the asterisk (*) wildcard in place of the group
          number to identify all group numbers and in place of the
          member number group to identify all member numbers.

       o  An alphanumeric UIC is a text string consisting of a member
          name and, optionally, a group name.

          You can use the asterisk (*) wildcard in place of the member
          name in an alphanumeric UIC but not in place of the group
          name.

       The UIC is enclosed in square brackets or angle brackets. A comma
       separates the two parts of the UIC. The first part of the UIC
       identifies the group of users a person belongs to. Group members
       share the same first number or group name in their UICs. You can
       control access to files according to UIC group numbers or group
       names. The second part of the UIC identifies the individual user
       in a group.

3.1  –  Examples

       In an ACL entry, you can use three types of UIC to identify
       users:

       o  By specifying all the digits of both parts of the UIC, you
          can identify one or more users who log in with the same UIC
          associated with their process. For example:

              UIC = [240,240]

       o  By using an asterisk (_*) as a wildcard in place of the second
          part of the UIC, you can identify users who belong to the same
          group and share the first part of their UICs. For example,
          the following specification can identify users with UICs
          [240,101], [240,300], [240,544], [240,777]:

              UIC = [240,*]

       o  By using asterisks in place of both groups of digits in the
          UIC, you identify all users, regardless of their UICs:

              UIC = [*,*]

          You must include the comma and enclose the UIC specification
          in square brackets or angle brackets. If you specify no
          UIC for an ACL entry, the dictionary supplies [_*,_*] as a
          default.

4  –  Username

       Specifying a username in an ACL entry limits the entry to one
       user or to a group of users who log in with the same username.
       For example:

       USER = WEAVER
Close Help