DEC ACA Services System Manager Guide

*HyperReader

  CONTENTS

  Title Page

  Copyright Page

  Preface

  1      Overview

  2      Customizing the ACA Services Environment

  2.1     Startup Verification
    2.1.1      System Context Object
    2.1.2      System Class Repository
    2.1.3      Control Server

  2.2     What Is Your System

  2.3     Services and the System Context Object

  2.4     Security
    2.4.1      Authentication
      2.4.1.1      Changing Authentication
    2.4.2      Security and Process Management Commands

  2.5     Verification
    2.5.1      Cross Node Communication
    2.5.2      Local Server Startup and Method Invocation

  3      Ongoing Maintenance

  3.1     System Management Account

  3.2     New Nodes, Users, Proxies

  3.3     Control Server Log File

  3.4     SAK Files

  3.5     Stopping Method Servers

  3.6     Purging Method Servers

  3.7     Applications

  3.8     Restarting ACA Services
    3.8.1      VAXcluster Considerations

  4      Additional Features and Capabilities

  4.1     Flexibility in Proxy Definitions

  4.2     Names Registry

  4.3     Moving Things Around

  4.4     Applications and Group Context Objects

  4.5     File Extension Table

  5      Internet, UCX, RPC, and Location Brokers

  5.1     Internet

  5.2     UCX

  5.3     RPC and Location Brokers

  5.4     Troubleshooting

  6      VMS Commands

  SET CTRL_SERVER/NEW_CONTEXT

  SHOW CTRL_SERVER

  SHOW SERVERS

  STOP CTRL_SERVER

  STOP SERVER_PROCESS

  STOP SESSION

  7      ULTRIX Commands

  acasmset

  acasmsho

  acasmstp

  TABLES

  1 Symbol Conventions

  2 Typeface Conventions

  1-1        File Names and Default Directories

  2-1        Sample System

  2-2        Settings for ACAS_AUTHENTICATION

  2-3        Process Management Command Security