FTAM/9000 User's Guide
Chapter 5 83
FTAM File Protection
Using FTAM File Protection
In the next example, the file owner sets special permissions which permit
multiple users to simultaneously read or read the attributes of the
directory (providing they know the password). However, a user will
require knowledge of a different passwords to delete, or change the
attributes of, the directory. Notice that the remote host in this example
(dublin) is not an HP- UX system, since it maintains concurrency and
passwords on file–actions, and the specified user for access control (sales)
is not a legal value for an HP-UX FTAM system.
Table 5-6
The last example shows how to use the -z option to delete a file which has
access control applied to it. The access control for file deletion includes a
password, and requires exclusive access to the file, so that the deletion
will not affect another user's operations.
$ fdel giovanni@rome:italy.data -z D=X.DeletePass
$ fcattr mike@dublin:MemoDir -i sales,RA=S#.ReadPass,D=X#.DelPass,C=X#.ChngPass