FTAM/9000 User's Guide
Chapter 5 73
FTAM File Protection
Introduction to FTAM File Protection
Permissions
The following table lists the name of each possible permission (or
“file–action”), an associated code letter, and an explanation of its
meaning. The code letters appear in action/concurrency strings
1
, and in
extended and summary listings from fls and ftam:
1. See “Action/Concurrency Strings” and “Using FTAM File Protec-
tion” later in this chapter.
Table 5-1 Possible File Actions
Action
Name
Code
Letter
Explanation: A user with this permission is allowed to ...
Read R ... read the file.
Insert I ... insert new data anywhere in the file.
rePlace P ... replace the file with a new version.
eXtend X ... insert new data at the end of the file.
Erase E ... erase all data in the file, leaving an empty file.
read
Attributes
A ... read the FTAM attributes of the file.
Change
attributes
C ... change the FTAM attributes of the file.
Delete D ... delete the file entirely, leaving no trace of it.