CONTENTS Title Page Copyright Page Preface Part I Planning Your System 1 Planning Directory Structure Overview of Directory Structure What is directory structure? Directory tree structures Types of volumes Types of directories What are system-created directories? Example of directory structure About NetWare Directory Structure and OpenVMS Directory Structure Relationship of NetWare volumes to OpenVMS volumes Relationship of NetWare directories to OpenVMS directories Examples of OpenVMS directory names Restriction to directory depth About OpenVMS File Names and DOS File Names About DOS and OpenVMS file names DOS and OpenVMS characters How OpenVMS converts DOS file names How OpenVMS converts DOS directory names Restricted length for file names How to support long file names How the server converts file names Planning Directory Structure Guidelines for planning directory structure How to plan directory structure For more information Planning DOS Directories What are DOS directories? How to plan DOS directories For more information Planning Application Directories What are application directories? Before you begin Principle Application directory structures How to choose application directory structures Guidelines for application directories Guidelines for application data files Planning Other Directories How to plan username directories How to plan work directories How to plan common directories How to plan batch file directories Example of Directory Planning Introduction Directory structure example Sample Directories Worksheet 2 Planning Users and Groups Overview of Users and Groups What is a user? What is the bindery? What is a group? Default users and groups Planning Users and Groups How to plan users and groups How to use the Users Worksheet and Group Worksheet How to use the User Defaults Worksheet For more information Step 1: Determine User Names How to determine user names Guidelines Step 2: Plan Hybrid Users What is a hybrid user? File access How to plan hybrid users For more information Step 3: Plan Groups How to plan groups Step 4: Plan Workgroups and Managers What is a workgroup? Types of group managers Workgroup Manager tasks User Account Manager tasks Comparing SUPERVISOR and manager rights Restrictions for planning managers Guidelines for delegating management responsibility How to plan for group managers Step 5: Decide Whether to Install Accounting What is Accounting? How to plan Accounting Example of planning Accounting For more information Step 6: Plan System Defaults for Defining Users Types of system defaults Effects of system defaults Guidelines for default account balances and restrictions Guidelines for default time restrictions Guidelines for intruder detection and lockout How to plan system defaults Step 7: Plan Individual Account Features Guidelines for individual account features How to plan individual account features Examples of Planning Users, Groups, and Defaults Example of planning users and groups Sample Users Worksheet Sample Group Worksheet Example of planning user defaults Sample User Defaults Worksheet 3 Planning Security Overview of File Server Security Types of file server security What is the NetWare security system? For more information Coordinating NetWare Security and OpenVMS Security Relationship of NetWare security and OpenVMS security Default users Guidelines for coordinating security Types of OpenVMS security checking How to coordinate security For more information Understanding Rights What are rights? Types of rights What is the Inherited Rights Mask? What are trustee assignments? How trustee assignments and the IRM work together Understanding Attributes What are attributes? Types of attributes How attributes and rights work together Planning NetWare Security How to plan NetWare security For more information Step 1: Plan the Inherited Rights Mask Step 2: Plan Trustee Assignments for Directories and Files Guidelines for making trustee assignments How to plan trustee assignments Step 3: Plan Attribute Security for Directories and Files Guidelines for assigning attributes How to plan attributes Example of Planning Security Trustee assignment example Sample Trustee Directory Security Worksheet 4 Planning Login Scripts Overview of Login Scripts What is a login script? Types of login scripts What are login script commands? How login scripts execute Planning Login Scripts How to plan login scripts For more information Step 1: Planning the System Login Script Contents of system login script Guidelines for system login script Example of a system login script Step 2: Planning the User Login Script Contents of user login script Guidelines for user login scripts Example of a user login script Part II Setting Up Your System 5 Setting Up Directories and Applications Setup Procedure for Directory Structure How to create directory structure For more information Step 1: Create Volumes How to create volumes Restriction on volume size For more information Step 2: Install DOS on the Network Before you begin How to install DOS on the network Step 3: Create Directories Four ways to create directories How to create username directories How to create other directories Step 4: Load Application Program Files Before you begin Guidelines for loading application program files How to load an application on the network What is a fake root directory? How to install an application in a fake root directory Step 5: Copy Application Data Files into Directories Step 6: Modify the Directories' Inherited Rights Mask (IRM) Default Inherited Rights Mask How to modify the directories' Inherited Rights Mask For more information Step 7: Assign Attributes to Directories and Files Guidelines for application files How to assign directory and file attributes For more information 6 Setting Up Users and Groups Setup Procedure for Users and Groups How to set up users and groups For more information Step 1: Install Accounting When to install the Accounting feature Before you begin Setup procedure for Accounting How to install the Accounting feature How to set up an accounting server Types of charge rates How to perform other accounting tasks Step 2: Set System Defaults When to set system defaults How system defaults work How to set system defaults Step 3: Create Groups Guidelines for creating groups How to create a group and assign a full name Step 4: Set Up Group Security in Files and Directories Setup procedure for group security How to assign group trustee rights in a directory How to assign group trustee rights to a file Step 5: Create Users Setup procedure for users Menu utilities for creating users How to create a user When to assign restrictions to users How to assign password and login restrictions to users How to assign a password to a user How to assign station restrictions How to assign time restrictions How to create a username directory How to add users to a group as members Step 6: Set Up User Security in Files and Directories Setup procedure for user security What is a security equivalence? How to designate a security equivalence Guideline for assigning user trustee rights to directories How to assign user trustee rights in a directory How to assign user trustee rights to a file Step 7: Designate Workgroup and User Account Managers (Optional) Responsibility for creating users Prerequisites How to designate a user or group as Workgroup Manager How to designate a user or group as User Account Manager Step 8: Create Hybrid Users (Optional) What is a hybrid user? Setup procedure for hybrid users What is the hybrid HOME volume? How to create user accounts How to designate a hybrid user How to configure server security for hybrid users Hybrid user tasks Step 9: Create Login Scripts Utilities for creating login scripts Guidelines for creating login scripts Location of login scripts How to create system login scripts How to create user login scripts How to execute a system login script without executing user login scripts How to copy one user's login script to another user A Planning Worksheets B Login Script Commands About Login Scripts About Login Script Commands About Identifier Variables Conventions # ATTACH BREAK COMSPEC DISPLAY DOS BREAK DOS SET DOS VERIFY DRIVE EXIT FDISPLAY FIRE PHASERS GOTO IF...THEN...ELSE INCLUDE MACHINE MAP PAUSE PCCOMPATIBLE REMARK SHIFT WRITE Examples of Login Scripts Sample System Login Scripts Sample User Login Script EXAMPLES 4-1 System Login Script 4-2 User Login Script FIGURES 1-1 Directory Structure 1-2 Directory Tree Structure 1-3 Types of Directories 1-4 Example of Directory Structure 1-5 Sample Directories Worksheet 2-1 Comparing SUPERVISOR and Manager Rights 2-2 Sample Users Worksheet 2-3 Sample Group Worksheet 2-4 Sample User Defaults Worksheet 3-1 Trustee Directory Security Worksheet B-1 Identifier Variables TABLES 1-1 Volume Types 1-2 Directory Types 1-3 System-Created Directories 1-4 Characters for DOS File Names 2-1 Guidelines for Workgroup and User Account Managers 2-2 Guidelines for Default Account Balances and Restrictions 2-3 Guidelines for Default Intruder Detection and Lockout 2-4 Guidelines for Individual Account Features 3-1 Security Checking Algorithms 3-2 Rights 3-3 Attributes 3-4 Security Example Directory Trustee Assignments 6-1 Procedure for Setting Up Users and Groups 6-2 Procedure for Setting Up Accounting 6-3 Guidelines for Creating Groups 6-4 Menu Utilities for Creating Users 6-5 Utilities for Creating Login Scripts