FTAM/9000 User's Guide
Chapter 5 79
FTAM File Protection
Action/Concurrency Strings
The previous example is reproduced below. Each element is labelled to
indicate its function in the command.
Figure 5-1
In this example, both the source and target files require the application
of the –z option to satisfy access control.
The source file (which is to be deleted during the move operation) is
protected against accidental deletion by having the password
(PassMeBy) required on a delete action.
The target file (which is to be replaced during the move operation) is
protected against unauthorized replacement by having the password
(SupercedeMe) required for a replace action
password A password associated with the file action; there may be no password.
HP-UX FTAM does not store passwords for file actions; this field is only
provided for users whose remote responders do support action passwords.
Element Description
FTAM move command
Source file name
Command option to satisfy
access control for source
file
Start of first
Target file name
A password is
required to
delete the
source file:
“X” specifies exclusive access,
to prevent conflict with another
user of the source file.
A password is
required to
replace the
target file:
“SupercedeMe”
“X” specifies
exclusive
access to
prevent
conflict with
another user of
the target file.
Start of second
access/concurrency
string. “P” specifies
“rePlace” permission,
which is required (in
this example) by access
control on the existing
target file.
“PassMeBy”
Command
option to
satisfy
access
control
for
target
file
$fmv myplan -z D=X.PassMeBy denver:FY91plan -z P=X.SupercedeMe
access/concurrency string.
“D” specifies “Delete”
permission, which is required
for the source file on a
“Move” operation. Read and
Read_attributes permissions
are also required to perform
a move; in this example,
these two actions have no
associated passwords or
concurrency locks, so they
require no special
treatment.