HELPLIB.HLB  —  RMU72  Set  Privilege
    Allows you to modify the root file access control list (ACL) for
    a database.

    A database's root file ACL determines the Oracle RMU commands
    that users can execute for the associated database.

1  –  Description

    The RMU Set Privilege command allows you to manipulate an entire
    root file ACL, or to create, modify, or delete access control
    entries (ACEs) in a root file ACL. See the Oracle Rdb Guide to
    Database Design and Definition for introductory information on
    ACEs and ACLs.

    Use the RMU Set Privilege command to add ACEs to a root file ACL
    by specifying the ACEs with the Acl qualifier.

    Privileges Required for Oracle RMU Commands shows the privileges
    a user must have to access each Oracle RMU command.

    If the database root file you specify with RMU Set Privilege
    command does not have an ACL, Oracle RMU creates one.

    The RMU Set Privilege command provides the following qualifiers
    to manipulate ACEs and ACLs in various ways:

       After
       Delete
       Like
       New
       Replace

    By default, any ACEs you add to a root file ACL are placed at
    the top of the ACL. Whenever Oracle RMU receives a request
    for Oracle RMU access for a database that has a root file ACL,
    it searches each entry in the ACL from the first to the last
    for the first match it can find, and then stops searching. If
    another match occurs further down in the root file ACL, it has no
    effect. Because the position of an ACE in a root file ACL is so
    important, you can use the After qualifier to correctly position
    an ACE. When you use the After qualifier, any additional ACEs are
    added after the specified ACE.

    You can delete ACEs from an ACL by including the Delete qualifier
    and specifying the ACEs with the Acl qualifier. To delete all the
    ACEs, include the Delete qualifier and specify the Acl qualifier
    without specifying any ACEs.

    You can copy an ACL from one root file to another by using the
    Like qualifier. The ACL of the root file specified with the Like
    qualifier replaces the ACL of the root file specified with the
    root-file-spec parameter.

    Use the New qualifier to delete all ACEs before adding any ACEs
    specified by the Acl, Like, or Replace qualifiers.

    You can replace existing ACEs in a root file ACL by using the
    Replace qualifier. Any ACEs specified with the Acl qualifier
    are deleted and replaced by those specified with the Replace
    qualifier.

    The existing ACE can be abbreviated when you use the Delete,
    Replace, or After qualifiers.

    Use the RMU Set Privilege command with the Edit qualifier to
    invoke the ACL editor. You can specify the following qualifiers
    only when you specify the Edit qualifier also:

       Journal
       Keep
       Mode
       Recover

    For more information on the ACL editor, see the OpenVMS
    documentation set.

2  –  Format

  (B)0RMU/Set Privilege root-file-spec

  Command Qualifiers                         x  Defaults
                                             x
  /Acl[=(ace[,...])]                         x  See description
  /Acl_File=filename                         x  See description
  /After=ace                                 x  See description
  /Delete[=All]                              x  See description
  /Edit                                      x  No editor invoked
  /[No]Journal[=file-spec]                   x  /Journal
  /Keep[=(Recovery_Journal)]                 x  See description
  /Like=source-root-file-spec                x  None
  /[No]Log                                   x  /Nolog
  /Mode=[No]Prompt                           x  /Mode=Prompt
  /New                                       x  None
  /[No]Recover[=file-spec]                   x  /Norecover
  /Replace=(ace[,...])                       x  None

3  –  Parameters

3.1  –  root-file-spec

    The root file for the database whose root file ACL you are
    modifying.

4  –  Command Qualifiers

4.1  –  Acl

    Acl[=(ace[,...])]

    Specifies one or more ACEs to be modified. When no ACE is
    specified, the entire ACL is affected. Separate multiple ACEs
    with commas. When you include the Acl qualifier, the specified
    ACEs are inserted at the top of the ACL unless you also specify
    the After qualifier. You cannot specify the Acl qualifier and the
    Acl_File qualifier on the same RMU command line.

    The format of an ACE is as follows:

    (Identifier=user-id, Access=access_mask)

    The user-id must be one of the following types of identifier:

    o  A user identification code (UIC) in [group-name,member-name]
       alphanumeric format

    o  A user identification code (UIC) in [group-number,member-
       number] numeric format

    o  A general identifier, such as SECRETARIES

    o  A system-defined identifier, such as DIALUP

    o  Wildcard characters in [*,*] format

    Names are not case sensitive. In addition, the Identifier and
    Access keywords can be abbreviated to one character. For example,
    the following ACE is valid:

    (I=isteward, A=RMU$ALL)

    The access_mask can be any of the following:

    o  One or more of the Oracle RMU privileges listed in the Oracle
       Rdb7 Oracle RMU Reference Manual

       If more than one privilege is specified, a plus sign (+) must
       be placed between the privileges.

    o  The keyword RMU$ALL

       These keywords indicate that you want the user to have all of
       the RMU privileges. (This keyword has no effect on system file
       privileges.)

    o  The keyword None

       This keyword indicates that you do not want the user
       to have any RMU or OpenVMS privileges. If you specify
       Acl=(id=username, access=READ+NONE), the specified user will
       have no RMU privileges and no READ privileges for the database
       files.

4.2  –  Acl File

    Acl_File=filename

    Specifies a file containing a list of ACEs, with one ACE
    specified per line. You can use continuation characters to
    continue an ACE on the next line, and you can include commented
    lines within the file. Within this file, use the dash (-) as a
    continuation character and the exclamation point (!) to indicate
    a comment.

    You cannot specify the Acl_File qualifier and the Acl qualifier
    on the same RMU command line.

4.3  –  After

    After=ace

    Indicates that all ACEs specified with the Acl qualifier are to
    be added after the ACE specified with the After qualifier. By
    default, any ACEs added to the ACL are always placed at the top
    of the list.

    You cannot use this qualifier with the Edit qualifier.

4.4  –  Delete

    Delete[=All]

    Indicates that the ACEs specified with the Acl qualifier are
    to be deleted. If no ACEs are specified with the Acl qualifier,
    the entire ACL is deleted. If you specify an ACE that was not
    specified with the Acl qualifier, you are notified that the ACE
    does not exist, and the delete operation continues.

    You cannot use this qualifier with the Edit qualifier.

4.5  –  Edit

    Edit

    Invokes the ACL editor and allows you to use the Journal,
    Keep, Mode, or Recover qualifiers. Oracle RMU ignores any other
    qualifiers you specify with the Edit qualifier.

    The RMU Set Privilege command with the Edit qualifier only
    functions off line. If you attempt it on line, an error message
    is generated. This restriction is necessary because the ACL
    editor requests exclusive write access to the database.

    To use the Edit qualifier, the SYS$SHARE:ACLEDTSHR.EXE image
    must be installed at system startup time, or, be installed by
    RMONSTART.COM. Contact your system manager if this image is not
    installed as needed.

    For more information on the ACL editor, see the OpenVMS
    documentation set.

4.6  –  Journal

    Journal[=file-spec]
    Nojournal

    Controls whether a journal file is created from the editing
    session. By default, a journal file is created if the editing
    session ends abnormally.

    If you omit the file specification, the journal file has the
    same name as the root file and a file type of .tjl. You can use
    the Journal qualifier to specify a journal file name that is
    different from the default. No wildcard characters are allowed in
    the Journal qualifier file-spec parameter.

    You must specify the Edit qualifier to use this qualifier.

4.7  –  Keep

    Keep[=(Recovery,Journal)]

    Determines whether the journal file, the recovery file, or both,
    are deleted when the editing session ends. The options are:

    o  Recovery-Saves the journal file used for restoring the ACL.

    o  Journal-Saves the journal file for the current editing
       session.

    You can shorten the Journal and Recover options to J and R,
    respectively. If you specify only one option, you can omit the
    parentheses.

    You must specify the Edit qualifier to use this qualifier. If you
    specify the Edit qualifier but do not specify the Keep qualifier,
    both the journal file for the current editing session and the
    journal file used for restoring the ACL are deleted when the
    editing session ends.

4.8  –  Like

    Like=source-root-file-spec

    Indicates that the ACL of the root file specified with the Like
    qualifier is to replace the ACL of the root file specified with
    the root-file-spec parameter of the RMU Set Privilege command.
    Any existing ACEs are deleted before the root file ACL specified
    by the Like qualifier is copied.

    You cannot use this qualifier with the Edit qualifier.

4.9  –  Log

    Log
    Nolog

    Directs the RMU Set Privilege command to return both the name of
    the root file that has been modified by the command and the ACL
    associated with the database. The default of Nolog suppresses
    this output.

    You cannot use this qualifier with the Edit qualifier.

4.10  –  Mode

    Mode=[No]Prompt

    Determines whether the ACL editor prompts for field values. By
    default, the ACL editor selects prompt mode.

    You must specify the Edit qualifier to use this qualifier.

4.11  –  New

    New

    Indicates that any existing ACE in the ACL of the root file
    specified with RMU Set Privilege is to be deleted. To use the
    New qualifier, you must specify a new ACL or ACE with the Acl,
    Like, or Replace qualifiers.

    You cannot use this qualifier with the Edit qualifier.

4.12  –  Recover

    Recover[=file-spec]
    Norecover

    Specifies the name of the journal file to be used in a recovery
    operation. If the file specification is omitted with the Recover
    qualifier, the journal is assumed to have the same name as the
    root file and a file type of .tjl. No wildcard characters are
    allowed with the Recover qualifier file-spec parameter.

    The default is the Norecover qualifier, where no recovery is
    attempted when you invoke the ACL editor to edit a root file ACL.

    You must specify Edit to use this qualifier.

4.13  –  Replace

    Replace=(ace[,...])

    Deletes the ACEs specified with the Acl qualifier and replaces
    them with those specified with the Replace qualifier. Any ACEs
    specified with the Acl qualifier must exist and must be specified
    in the order in which they appear in the ACL.

    This qualifier cannot be used with the Edit qualifier.

5  –  Usage Notes

    o  You must have the RMU$SECURITY privilege in the root file ACL
       for a database or the OpenVMS SECURITY or BYPASS privilege
       to use the RMU Set Privilege command for the database. The
       RMU$SECURITY access is VMS BIT_15 access in the ACE. You can
       grant yourself BIT_15 access by using the DCL SET ACL command
       if you have (READ+WRITE+CONTROL) access.

    o  By default, a root file ACL is created for every Oracle Rdb
       database. In some cases, the root file ACL may not allow
       the appropriate Oracle RMU access for the database to all
       Oracle RMU users. In these situations, you must use the RMU
       Set Privilege command to modify the root file ACL to give the
       appropriate Oracle RMU access to Oracle RMU users. Privileges
       Required for Oracle RMU Commands shows the privileges required
       to access each Oracle RMU command.

    o  The root file ACL created by default on each Oracle Rdb
       database controls only a user's Oracle RMU access to the
       database (by specifying privileges that will allow a user or
       group of users access to specific Oracle RMU commands). Root
       file ACLs do not control a user's access to the database with
       SQL statements.

       A user's access to a database with SQL statements is governed
       by the privileges granted to the user in the database ACL
       (the ACL that is displayed using the SQL SHOW PROTECTION ON
       DATABASE command).

    o  If you find that the root file ACL has changed, or is not
       set as expected, it may be because a layered product has
       manipulated the OpenVMS directory or file ACLs. This can
       result in the unintentional alteration of an Oracle RMU access
       right.

       For example, Oracle CDD/Repository may use the following ACE:

       (IDENTIFIER=[*,*],OPTIONS=DEFAULT+PROPAGATE,ACCESS=NONE)

       If this ACE is propagated to an Oracle Rdb database, such
       as CDD$DATABASE or CDD$TEMPLATE, OpenVMS privileges may be
       required to manage that database. Or, you can use the RMU Set
       Privilege command to change the ACL on the affected database.

    o  If you need to move a database from one system to another, you
       should be aware that the identifiers used in the database's
       root file ACL on the source system are not likely to be
       valid identifiers on the destination system. Thus, if the
       database root file ACL from the source system is moved to the
       destination system without modification, only those users with
       the same identifiers on both systems have the same Oracle RMU
       access to the database on the destination system as they had
       to the database on the source system.

       For example, suppose that the mf_personnel database with the
       following root file ACL is moved from its current system to
       another node. If the database root file ACL is moved without
       modification to the destination node, the users USER, USER2,
       USER3, USER4, and USER5 will not have any Oracle RMU access to
       the database on the destination node unless they have the same
       identities on the destination node.

       $ RMU/SHOW PRIVILEGE MF_PERSONNEL.RDB
       Object type: file, Object name:SQL_USER:[USER]MF_PERSONNEL.RDB;1,
       on 31-MAR-1992 15:48:36.24

          (IDENTIFIER=[SQL,USER],ACCESS=READ+WRITE+CONTROL+RMU$ALTER+
          RMU$ANALYZE+RMU$BACKUP+RMU$CONVERT+RMU$COPY+RMU$DUMP+RMU$LOAD+
          RMU$MOVE+RMU$OPEN+RMU$RESTORE+RMU$SECURITY+RMU$SHOW+RMU$UNLOAD+
          RMU$VERIFY)
          (IDENTIFIER=[SQL,USER2],ACCESS=RMU$ANALYZE+RMU$OPEN+RMU$VERIFY)
          (IDENTIFIER=[SQL,USER3],ACCESS=RMU$SECURITY)
          (IDENTIFIER=[RDB,USER4],ACCESS=RMU$BACKUP+RMU$CONVERT+RMU$DUMP+
          RMU$RESTORE)
          (IDENTIFIER=[RDB,USER5],ACCESS=RMU$LOAD+RMU$SHOW)
          (IDENTIFIER=[*,*],ACCESS=NONE)

    o  The following list describes some ways to move a database from
       one node to another and explains what happens to the original
       root file ACL in each scenario:

       -  RMU Restore command

          First, use the RMU Backup command to back up the database
          on the source node and to create an .rbf file. Then, copy
          the .rbf file from the source node to the destination
          node. When you use the RMU Restore command to re-create
          the database from the source node on the destination node,
          the database on the destination node will have the same
          root file ACL as the database on the source node. If a
          user with the RMU$SECURITY privilege in the root file
          ACL on the source node has the same identifier on the
          destination node, that user can modify the root file ACL
          on the destination node to grant users the privileges they
          need for Oracle RMU access to the database. Otherwise, a
          user with one of the OpenVMS override privileges (SECURITY
          or BYPASS) needs to modify the root file ACL.

       -  RMU Restore command with the Noacl qualifier

          First, use the RMU Backup command to back up the database
          on the source node and to create an .rbf file. Then, copy
          the .rbf file from the source node to the destination
          node. When you use the RMU Restore command with the Noacl
          qualifier to re-create the database from the source node on
          the destination node, the database on the destination node
          is created with an empty root file ACL. A user with one of
          the OpenVMS override privileges (SECURITY or BYPASS) needs
          to modify the root file ACL to grant users the privileges
          they need for Oracle RMU access to the database.

       -  SQL IMPORT statement

          First, use the SQL EXPORT statement on the source node
          to create an .rbr file. Then, copy the .rbr file from the
          source node to the destination node. When you use the SQL
          IMPORT statement on the destination node, the imported
          database is created with the same root file ACL as existed
          on the database on the source node. If a user with the
          RMU$SECURITY privilege in the root file ACL on the source
          node has the same identifier on the destination node, that
          user can modify the root file ACL on the destination node
          to grant users the privileges they need for Oracle RMU
          access to the database. Otherwise, a user with one of the
          OpenVMS override privileges (SECURITY or BYPASS) needs to
          modify the root file ACL to grant users the privileges they
          need for Oracle RMU access to the database.

       -  SQL IMPORT NO ACL statement

          First, use the SQL EXPORT statement on the source node to
          create an .rbr file. Then, copy the .rbr file from the
          source node to the destination node. When you use the
          SQL IMPORT NO ACL statement on the destination node, the
          imported database is created with a root file ACL that
          contains one ACE. The single ACE will grant the OpenVMS
          READ, WRITE, and CONTROL privileges plus all the Oracle RMU
          privileges to the user who performed the IMPORT operation.
          The user who performed the IMPORT operation can modify the
          root file ACL to grant users the privileges they need for
          Oracle RMU access to the database.

6  –  Examples

    Example 1

    The following example assumes that the user with a user
    identification code (UIC) of [SQL,USER] has created the mf_
    test_db database and is therefore the owner of the database.
    After creating the mf_test_db database, the owner displays the
    root file ACL for the database. Then the owner grants Oracle RMU
    privileges to database users. The Oracle RMU privileges granted
    to each type of user depend on the type of Oracle RMU access the
    user needs to the database.

    $! Note that by default the owner (the user with a UIC of [SQL,USER])
    $! is granted all the Oracle RMU privileges in the root file
    $! ACL and no other users are granted any Oracle RMU privileges.

    $ RMU/SHOW PRIVILEGE MF_TEST_DB.RDB
    Object type: file,  Object name: SQL_USER:[USER]MF_TEST_DB.RDB;1,
    on 30-MAR-1996 15:51:55.79

        (IDENTIFIER=[SQL,USER],ACCESS=READ+WRITE+CONTROL+RMU$ALTER+
        RMU$ANALYZE+RMU$BACKUP+RMU$CONVERT+RMU$COPY+RMU$DUMP+RMU$LOAD+
        RMU$MOVE+RMU$OPEN+RMU$RESTORE+RMU$SECURITY+RMU$SHOW+RMU$UNLOAD+
        RMU$VERIFY)
    $!
    $! The owner uses the RMU Set Privilege command and the After
    $! qualifier to grant the RMU$ANALYZE, RMU$OPEN, and
    $! RMU$VERIFY privileges to a user with a UIC of [SQL,USER2].
    $! This user will serve as the database administrator for the
    $! mf_test_db database.

    $ RMU/SET PRIVILEGE/ACL=(IDENTIFIER=[SQL,USER2],ACCESS=RMU$ANALYZE -
    _$ +RMU$OPEN+RMU$VERIFY) -
    _$ /AFTER=(IDENTIFIER=[SQL,USER])/LOG MF_TEST_DB.RDB
    %RMU-I-MODIFIED, SQL_USER:[USER]MF_TEST_DB.RDB;1 modified

    $!
    $! Next, the owner grants the RMU$SECURITY privilege to a user with a
    $! UIC of [SQL,USER3].  This gives the user USER3 the ability
    $! to grant other users the appropriate privileges they need for
    $! accessing the database with Oracle RMU commands.  Because both
    $! the database creator and user USER3 have the RMU$SECURITY
    $! privilege, both of them can modify the root file ACL for the
    $! database.

    $ RMU/SET PRIVILEGE/ACL=(IDENTIFIER=[SQL,USER3],ACCESS=RMU$SECURITY) -
    _$ /AFTER=(IDENTIFIER=[SQL,USER2])/LOG MF_TEST_DB.RDB
    %RMU-I-MODIFIED, SQL_USER:[USER]MF_TEST_DB.RDB;1 modified
    $!
    $! The user with a UIC of [RDB,USER4], who will serve as the database
    $! operator, is granted the RMU$BACKUP, RMU$CONVERT, RMU$DUMP, and
    $! RMU$RESTORE privileges:
    $ RMU/SET PRIVILEGE/ACL=(IDENTIFIER=[RDB,USER4],ACCESS=RMU$BACKUP -
    _$ +RMU$CONVERT+RMU$DUMP+RMU$RESTORE) -
    _$ /AFTER=(IDENTIFIER=[SQL,USER3])/LOG MF_TEST_DB.RDB
    %RMU-I-MODIFIED, SQL_USER:[USER]MF_TEST_DB.RDB;1 modified
    $!
    $! The RMU$LOAD and RMU$SHOW privileges are granted to the user
    $! with a UIC of [RDB,USER5]. This user will be writing programs
    $! that load data into the database.

    $ RMU/SET PRIVILEGE/ACL=(IDENTIFIER=[RDB,USER5],ACCESS=RMU$LOAD -
    _$ +RMU$SHOW) /AFTER=(IDENTIFIER=[RDB,USER4]) MF_TEST_DB.RDB
    %RMU-I-MODIFIED, SQL_USER:[USER]MF_TEST_DB.RDB;1 modified
    $!
    $! No privileges are granted to all other users.

    $ RMU/SET PRIVILEGE/ACL=(IDENTIFIER=[*,*],ACCESS=NONE) -
    _$ /AFTER=(IDENTIFIER=[RDB,USER5])/LOG MF_TEST_DB.RDB
    %RMU-I-MODIFIED, SQL_USER:[USER]MF_TEST_DB.RDB;1 modified
    $!
    $! The RMU/SHOW PRIVILEGE command displays the root file ACL for the
    $! mf_test_db database.

    $ RMU/SHOW PRIVILEGE MF_TEST_DB.RDB
    Object type: file,  Object name: SQL_USER:[USER]MF_TEST_DB.RDB;1,
    on 30-MAR-1996 15:52:17.03

        (IDENTIFIER=[SQL,USER],ACCESS=READ+WRITE+CONTROL+RMU$ALTER+
        RMU$ANALYZE+RMU$BACKUP+RMU$CONVERT+RMU$COPY+RMU$DUMP+RMU$LOAD+
        RMU$MOVE+RMU$OPEN+RMU$RESTORE+RMU$SECURITY+RMU$SHOW+RMU$UNLOAD+
        RMU$VERIFY)
        (IDENTIFIER=[SQL,USER2],ACCESS=RMU$ANALYZE+RMU$OPEN+RMU$VERIFY)
        (IDENTIFIER=[SQL,USER3],ACCESS=RMU$SECURITY)
        (IDENTIFIER=[RDB,USER4],ACCESS=RMU$BACKUP+RMU$CONVERT+RMU$DUMP+
        RMU$RESTORE)
        (IDENTIFIER=[RDB,USER5],ACCESS=RMU$LOAD+RMU$SHOW)
        (IDENTIFIER=[*,*],ACCESS=NONE)

    Example 2

    The following command adds an ACE for the user with a UIC of
    [RDB,USER1] to the root file ACL for the personnel database. This
    ACE grants [RDB,USER1] the RMU$BACKUP privilege for the personnel
    database. The RMU$BACKUP privilege allows user [RDB,USER1]
    to access the RMU Backup, RMU Backup After_Journal, and RMU
    Checkpoint commands for the personnel database.

    $ RMU/SET PRIVILEGE/ACL=(IDENTIFIER=[RDB,USER1],ACCESS=RMU$BACKUP) -
    _$ PERSONNEL.RDB

    Example 3

    The Replace qualifier in the following example causes the ACE
    in the root file ACL for the user with a UIC of [RDB,USER4]
    to be replaced by the ACE specified for the user with a UIC of
    [SQL,USER6]:

    $ RMU/SET PRIVILEGE/ACL=(IDENTIFIER=[RDB,USER4]) -
    _$ /REPLACE=(IDENTIFIER=[SQL,USER6],ACCESS=RMU$BACKUP+RMU$CONVERT -
    _$ +RMU$DUMP+RMU$RESTORE)/LOG MF_TEST_DB.RDB
    %RMU-I-MODIFIED, SQL_USER:[USER]MF_TEST_DB.RDB;1 modified
    $!
    $ RMU/SHOW PRIVILEGE MF_TEST_DB.RDB
    Object type: file,  Object name: SQL_USER:[USER]MF_TEST_DB.RDB;1,
    on 30-MAR-1996 15:52:23.92

        (IDENTIFIER=[SQL,USER],ACCESS=READ+WRITE+CONTROL+RMU$ALTER+
        RMU$ANALYZE+RMU$BACKUP+RMU$CONVERT+RMU$COPY+RMU$DUMP+RMU$LOAD+
        RMU$MOVE+RMU$OPEN+RMU$RESTORE+RMU$SECURITY+RMU$SHOW+RMU$UNLOAD+
        RMU$VERIFY)
        (IDENTIFIER=[SQL,USER2],ACCESS=RMU$ANALYZE+RMU$OPEN+RMU$VERIFY)
        (IDENTIFIER=[SQL,USER3],ACCESS=RMU$SECURITY)
        (IDENTIFIER=[SQL,USER6],ACCESS=RMU$BACKUP+RMU$CONVERT+RMU$DUMP+
        RMU$RESTORE)
        (IDENTIFIER=[RDB,USER5],ACCESS=RMU$LOAD+RMU$SHOW)
        (IDENTIFIER=[*,*],ACCESS=NONE)

    Example 4

    The Delete qualifier in the following example causes the ACE for
    the user with a UIC of [RDB,USER5] to be deleted from the root
    file ACL for the mf_test_db database:

    $ RMU/SET PRIVILEGE/ACL=(IDENTIFIER=[RDB,USER5]) -
    _$ /DELETE/LOG MF_TEST_DB.RDB
    %RMU-I-MODIFIED, SQL_USER:[USER]MF_TEST_DB.RDB;1 modified
    $!
    $ RMU/SHOW PRIVILEGE MF_TEST_DB.RDB
    Object type: file,  Object name: SQL_USER:[USER]MF_TEST_DB.RDB;1,
    on 30-MAR-1996 15:52:29.07

        (IDENTIFIER=[SQL,USER],ACCESS=READ+WRITE+CONTROL+RMU$ALTER+
        RMU$ANALYZE+RMU$BACKUP+RMU$CONVERT+RMU$COPY+RMU$DUMP+RMU$LOAD+
        RMU$MOVE+RMU$OPEN+RMU$RESTORE+RMU$SECURITY+RMU$SHOW+RMU$UNLOAD+
        RMU$VERIFY)
        (IDENTIFIER=[SQL,USER2],ACCESS=RMU$ANALYZE+RMU$OPEN+RMU$VERIFY)
        (IDENTIFIER=[SQL,USER3],ACCESS=RMU$SECURITY)
        (IDENTIFIER=[SQL,USER6],ACCESS=RMU$BACKUP+RMU$CONVERT+RMU$DUMP+
        RMU$RESTORE)
        (IDENTIFIER=[*,*],ACCESS=NONE)

    Example 5

    In the following example, the Like qualifier copies the root file
    ACL from the mf_test_db database to the test_db database. As part
    of this operation, the original root file ACL for the test_db
    database is deleted.

    $ RMU/SHOW PRIVILEGE TEST_DB.RDB
    Object type: file,  Object name: SQL_USER:[USER]TEST_DB.RDB;1,  on
    30-MAR-1996 15:52:31.48

        (IDENTIFIER=[SQL,USER],ACCESS=READ+WRITE+CONTROL+RMU$ALTER+
        RMU$ANALYZE+RMU$BACKUP+RMU$CONVERT+RMU$COPY+RMU$DUMP+RMU$LOAD+
        RMU$MOVE+RMU$OPEN+RMU$RESTORE+RMU$SECURITY+RMU$SHOW+RMU$UNLOAD+
        RMU$VERIFY)
    $ !
    $ RMU/SHOW PRIVILEGE MF_TEST_DB.RDB
    Object type: file,  Object name: SQL_USER:[USER]MF_TEST_DB.RDB;1,
    on 30-MAR-1996 15:52:33.86

        (IDENTIFIER=[SQL,USER],ACCESS=READ+WRITE+CONTROL+RMU$ALTER+
        RMU$ANALYZE+RMU$BACKUP+RMU$CONVERT+RMU$COPY+RMU$DUMP+RMU$LOAD+
        RMU$MOVE+RMU$OPEN+RMU$RESTORE+RMU$SECURITY+RMU$SHOW+RMU$UNLOAD+
        RMU$VERIFY)
        (IDENTIFIER=[SQL,USER2],ACCESS=RMU$ANALYZE+RMU$OPEN+RMU$VERIFY)
        (IDENTIFIER=[SQL,USER3],ACCESS=RMU$SECURITY)
        (IDENTIFIER=[SQL,USER6],ACCESS=RMU$BACKUP+RMU$CONVERT+RMU$DUMP+
        RMU$RESTORE)
        (IDENTIFIER=[*,*],ACCESS=NONE)
    $!
    $ RMU/SET PRIVILEGE/LIKE=MF_TEST_DB.RDB/LOG TEST_DB.RDB
    %RMU-I-MODIFIED, SQL_USER:[USER]TEST_DB.RDB;1 modified
    $!
    $ RMU/SHOW PRIVILEGE TEST_DB.RDB
    Object type: file,  Object name: SQL_USER:[USER]TEST_DB.RDB;1,  on
    30-MAR-1996 15:52:41.36

        (IDENTIFIER=[SQL,USER],ACCESS=READ+WRITE+CONTROL+RMU$ALTER+
        RMU$ANALYZE+RMU$BACKUP+RMU$CONVERT+RMU$COPY+RMU$DUMP+RMU$LOAD+
        RMU$MOVE+RMU$OPEN+RMU$RESTORE+RMU$SECURITY+RMU$SHOW+RMU$UNLOAD+
        RMU$VERIFY)
        (IDENTIFIER=[SQL,USER2],ACCESS=RMU$ANALYZE+RMU$OPEN+RMU$VERIFY)
        (IDENTIFIER=[SQL,USER3],ACCESS=RMU$SECURITY)
        (IDENTIFIER=[SQL,USER6],ACCESS=RMU$BACKUP+RMU$CONVERT+RMU$DUMP+
        RMU$RESTORE)
        (IDENTIFIER=[*,*],ACCESS=NONE)

    Example 6

    The New qualifier in the following example deletes all the
    existing ACEs and the Acl qualifier specifies a new ACE for the
    root file ACL for the mf_test_db database. Note that after the
    RMU Set Privilege command in this example is issued, only the
    user with a UIC of [SQL,USER2] or a user with an OpenVMS override
    privilege would be able to display the root file ACL for the mf_
    test_db database.

    $ RMU/SHOW PRIVILEGE MF_TEST_DB.RDB
    Object type: file,  Object name: SQL_USER:[USER]MF_TEST_DB.RDB;1,
    on 30-MAR-1996 15:52:44.50

        (IDENTIFIER=[SQL,USER],ACCESS=READ+WRITE+CONTROL+RMU$ALTER+
        RMU$ANALYZE+RMU$BACKUP+RMU$CONVERT+RMU$COPY+RMU$DUMP+RMU$LOAD+
        RMU$MOVE+RMU$OPEN+RMU$RESTORE+RMU$SECURITY+RMU$SHOW+RMU$UNLOAD+
        RMU$VERIFY)
        (IDENTIFIER=[SQL,USER2],ACCESS=RMU$ANALYZE+RMU$OPEN+RMU$VERIFY)
        (IDENTIFIER=[SQL,USER3],ACCESS=RMU$SECURITY)
        (IDENTIFIER=[SQL,USER6],ACCESS=RMU$BACKUP+RMU$CONVERT+RMU$DUMP+
        RMU$RESTORE)
        (IDENTIFIER=[*,*],ACCESS=NONE)
    $!
    $ RMU/SET PRIVILEGE/NEW -
    _$ /ACL=(IDENTIFIER=[SQL,USER2],ACCESS=READ+WRITE+CONTROL+ -
    _$ RMU$ALTER+RMU$ANALYZE+RMU$BACKUP+RMU$CONVERT+RMU$COPY+ -
    _$ RMU$DUMP+RMU$LOAD+RMU$MOVE+RMU$OPEN+RMU$RESTORE+RMU$SHOW+ -
    _$ RMU$UNLOAD+RMU$VERIFY)/LOG MF_TEST_DB.RDB
    %RMU-I-MODIFIED, SQL_USER:[USER]MF_TEST_DB.RDB;1 modified
Close Help