CONTENTS Title Page Copyright Page Preface 1 Overview 2 Customizing the ACA Services Environment 2.1 Startup Verification 2.1.1 System Context Object 2.1.2 System Class Repository 2.1.3 Control Server 2.2 What Is Your System 2.3 Services and the System Context Object 2.4 Security 2.4.1 Authentication 2.4.1.1 Changing Authentication 2.4.2 Security and Process Management Commands 2.5 Verification 2.5.1 Cross Node Communication 2.5.2 Local Server Startup and Method Invocation 3 Ongoing Maintenance 3.1 System Management Account 3.2 New Nodes, Users, Proxies 3.3 Control Server Log File 3.4 SAK Files 3.5 Stopping Method Servers 3.6 Purging Method Servers 3.7 Applications 3.8 Restarting ACA Services 3.8.1 VAXcluster Considerations 4 Additional Features and Capabilities 4.1 Flexibility in Proxy Definitions 4.2 Names Registry 4.3 Moving Things Around 4.4 Applications and Group Context Objects 4.5 File Extension Table 5 Internet, UCX, RPC, and Location Brokers 5.1 Internet 5.2 UCX 5.3 RPC and Location Brokers 5.4 Troubleshooting 6 VMS Commands SET CTRL_SERVER/NEW_CONTEXT SHOW CTRL_SERVER SHOW SERVERS STOP CTRL_SERVER STOP SERVER_PROCESS STOP SESSION 7 ULTRIX Commands acasmset acasmsho acasmstp TABLES 1 Symbol Conventions 2 Typeface Conventions 1-1 File Names and Default Directories 2-1 Sample System 2-2 Settings for ACAS_AUTHENTICATION 2-3 Process Management Command Security