Technical data

6.8 Saving Your Customization .................................... 6–23
6.9 Using SYSMAN to Manage System Time.......................... 6–24
6.9.1 Modifying the System Time ................................. 6–24
6.9.1.1 Resetting System Time After January 1 . ................... 6–25
7 Managing User Accounts
7.1 Understanding the User Authorization File ........................ 7–2
7.1.1 Priority ................................................ 7–2
7.1.2 Limits and Quotas ........................................ 7–2
7.1.3 Privileges . . . ............................................ 7–3
7.2 Understanding the Protection of Authorization Files ................ 7–4
7.3 Understanding UAF Login Checks. . . ............................ 7–5
7.4 Managing System-Supplied UAF Accounts ........................ 7–6
7.4.1 Understanding System-Supplied UAF Accounts ................. 7–6
7.4.2 Creating Accounts on Alpha Systems (Alpha Only) ............... 7–7
7.4.2.1 Creating Field Service Accounts (Alpha Only) ................ 7–8
7.4.2.2 Creating SYSTEST and SYSTEST_CLIG Accounts (Alpha
Only) . . . ............................................ 7–9
7.4.3 Maintaining System-Supplied Accounts (VAX Only) . . . ........... 7–9
7.4.4 Using the SYSTEM Account ................................ 7–10
7.4.5 Using AUTHORIZE to Maintain UAF Accounts ................. 7–10
7.5 Preparing to Add User Accounts ................................ 7–12
7.5.1 Choosing an Account Type .................................. 7–12
7.5.2 Performing Additional Tasks ................................ 7–13
7.5.2.1 Selecting a User Name and Password . . . ................... 7–13
7.5.2.2 Assigning the User Identification Code . . ................... 7–14
7.5.2.3 Adding a Disk Quota Entry . . ............................ 7–15
7.5.2.4 Setting the User Default Device for an Interactive Account. . . . . . 7–15
7.5.2.5 Setting the User Default Device for a Captive Account ......... 7–16
7.5.3 Understanding Account Security . ............................ 7–16
7.6 Adding User Accounts ........................................ 7–17
7.6.1 Adding a User Account with AUTHORIZE . . ................... 7–17
7.6.2 Adding a User Account with a Command Procedure . . . ........... 7–18
7.7 Maintaining User Accounts .................................... 7–19
7.7.1 Using Command Procedures for Interactive Accounts . . ........... 7–19
7.7.2 Modifying a User Account .................................. 7–23
7.7.3 Listing User Accounts . .................................... 7–24
7.7.4 Maintaining the User Environment ........................... 7–24
7.7.5 Deleting a User Account ................................... 7–25
7.7.6 Using BACKUP to Remove User Files ......................... 7–27
7.7.7 Disabling a User Account ................................... 7–27
7.8 Restricting the Use of Accounts ................................. 7–27
7.8.1 Setting Day Types ........................................ 7–28
7.8.2 Restricting Logins to Specific Times........................... 7–28
7.8.3 Restricting CPU Time . .................................... 7–29
7.8.4 Restricting Login Functions ................................. 7–30
7.8.5 Using Login Command Procedures for Restricted or Captive
Accounts................................................ 7–31
7.8.6 Setting Priorities for User Processes .......................... 7–33
7.9 Setting Up Special Accounts ................................... 7–34
7.9.1 Setting Up an Automatic Login Account with SYSMAN ........... 7–34
7.9.2 Setting Up a Project Account with ACL Identifiers ............... 7–35
7.9.3 Understanding Network Proxy Accounts ....................... 7–37
viii