FTAM/9000 User's Guide

80 Chapter 5
FTAM File Protection
Using FTAM File Protection
Using FTAM File Protection
The tables in this section describe the syntax and use of HP-UX FTAM's
action/concurrency strings. Action/concurrency strings are always and
only used as arguments to certain command options, as noted in the
following tables.
NOTE The syntax for action/concurrency strings is abbreviated to “a/c” in these
tables. The previous section contains details about action/concurrency
strings.
Table 5-4 shows the use of action/concurrency strings with interactive
FTAM commands. Note that unless a file has passwords or concurrency
control associated with actions, you do not need to use the y or z option to
satisfy access control. You either have permission to perform the desired
action, or you do not.
Table 5-4 Interactive ftam Commands with Options Using
Action/Concurrency Strings
Table 5-5 shows the use of action/concurrency strings with command-line
FTAM commands. The option (and its argument) apply to the
immediately preceding file name in each command.
Command Option Syntax Comments
set y set y a/c Used (when necessary) to satisfy access
control and/or concurrency control on target
files in subsequent commands.
set z set z a/c Used (when necessary) to satisfy access
control and/or concurrency control on source
files in subsequent commands.
cattr –i cattr –i file
user,a/c
Used to set file protection on a file. The user is
the user being granted permissions (and
associated concurrency control, if any). For
HP- UX filestores, user must be user, group,
or other.