FTAM/9000 User's Guide

Chapter 5 71
FTAM File Protection
Introduction to FTAM File Protection
NOTE Vendors implement an FTAM access control scheme appropriate to the
host system. Because of this, using access control is apt to cause
complications.
For example, HP-UX FTAM can apply access control to a file according to
the three HP-UX ownership classes: user, group, and other. Other FTAM
implementations may apply access control to individual users, different
classes of users, or elect to not implement file protection at all. You must
have considerable knowledge about the access control scheme that a
remote FTAM host uses before you can effectively use FTAM access
control.
In general, HP recommends using FTAM access control only if you have
strict file protection requirements.
Application of File Protection
There are three aspects to using FTAM file protection mechanisms:
Setting (or removing) file protection for a file. This is similar to
putting a padlock on a building's door. You can set file protection on a
file in either of two ways:
At the system prompt, use the fcattr command.
At the ftam> prompt, use the cattr command.
Usually, a file's owner will set appropriate access control (and, optionally,
concurrency control) on a file. Note that if you do not explicitly apply file
protection to a file, it is open to general use (within the constraints of the
underlying HP-UX file system).
Satisfying file protection conditions on a file which has had access
control applied to it. This is similar to using a key to open the padlock
and gain access to the building. You satisfy file protection conditions
one of two ways:
At the system prompt, use the -z option on FTAM commands.
This option is explained later in this chapter.
At the ftam> prompt, use the set -y or set -z command. This
command is explained in Chapter 2, “Using Interactive FTAM,
and with specific file protection details later in this chapter.