FTAM/9000 User's Guide
Chapter 5 81
FTAM File Protection
Using FTAM File Protection
Note that unless a file has passwords or concurrency control associated
with actions, you do not need to use the –z option to satisfy access
control. You either have permission to perform the desired action, or you
do not.
To obtain exclusive access to a file, use the –X option, which does not
require an action/concurrency string argument.
Table 5-5 Command-Line FTAM Commands with Options Using
Action/Concurrency Strings
Examples
The following examples illustrate correct use of the -z and -i option for
several different situations.
Command Option Syntax Comments
fcattr –i fcattr –i file
user,a/c
Used to place file protection on a file. The
user is the user being granted permissions
(and associated concurrency control, if any).
For HP-UX filestores, user must be user,
group, or other.
fcp -z fcp source –z a/c
target –z a/c
The command option is used (when
required) to satisfy access control and/or
concurrency control on the file that
immediately precedes the command option.
fmv –z fmv source –z a/c
target –z a/c
The command option is used (when
required) to satisfy access control and/or
concurrency control on the file that
immediately precedes the command option.
fls –z fls name –z a/c The command option is used (when
required) to satisfy access control and/or
concurrency control on the file that
immediately precedes the command option.
fdel –z fdel file –z a/c The command option is used (when
required) to satisfy access control and/or
concurrency control on the file that
immediately precedes the command option.