FTAM/9000 User's Guide

Chapter 5 77
FTAM File Protection
Concepts of FTAM File Protection
(Read and read Attributes) could be given “shared” access , which allows
multiple users to perform these actions simultaneously. Possible
concurrency controls are listed in Table 5-2.
Note, however, that HP-UX FTAM does not keep track of concurrency
control applied to file–actions. There is no effect if you attempt to set (or
satisfy) file–action concurrency control on files stored by an HP-UX
FTAM host, either local or remote. However, you can satisfy (i.e., supply)
a concurrency control code when a remote FTAM host requires one, via
the –z option and an action/concurrency string. These are discussed in
the next section. Furthermore, you can obtain exclusive access to an
HP-UX FTAM file by using the –X option, described next.
Obtaining Exclusive Access
HP-UX FTAM also provides a “shortcut” when you need exclusive access
to an FTAM file. Whenever you need exclusive access to a file and can
use command-line FTAM, the –X option is the right choice.
For example, the following command obtains a “snapshot” copy of a file
which may have multiple users:
$ fcp michael@nairobi:/users/reservations/june.reserv -X
june.bookings
As noted at the start of this chapter, the only thing most people need to
know about FTAM file protection is how to use the –X option. Unless a
remote file has a passwords associated with file actions, your use of
FTAM's file protection scheme will probably only involve using the –X
option to obtain exclusive access to certain files.