PATHWORKS for OpenVMS (NetWare) Planning and Setup Guide

*HyperReader

  CONTENTS

  Title Page

  Copyright Page

  Preface

  Part I    Planning Your System

  1      Planning Directory Structure

  Overview of Directory Structure
    What is directory structure?
    Directory tree structures
    Types of volumes
    Types of directories
    What are system-created directories?
    Example of directory structure

  About NetWare Directory Structure and OpenVMS Directory Structure
    Relationship of NetWare volumes to OpenVMS volumes
    Relationship of NetWare directories to OpenVMS directories
    Examples of OpenVMS directory names
    Restriction to directory depth

  About OpenVMS File Names and DOS File Names
    About DOS and OpenVMS file names
    DOS and OpenVMS characters
    How OpenVMS converts DOS file names
    How OpenVMS converts DOS directory names
    Restricted length for file names
    How to support long file names
    How the server converts file names

  Planning Directory Structure
    Guidelines for planning directory structure
    How to plan directory structure
    For more information

  Planning DOS Directories
    What are DOS directories?
    How to plan DOS directories
    For more information

  Planning Application Directories
    What are application directories?
    Before you begin
    Principle
    Application directory structures
    How to choose application directory structures
    Guidelines for application directories
    Guidelines for application data files

  Planning Other Directories
    How to plan username directories
    How to plan work directories
    How to plan common directories
    How to plan batch file directories

  Example of Directory Planning
    Introduction
    Directory structure example
    Sample Directories Worksheet

  2      Planning Users and Groups

  Overview of Users and Groups
    What is a user?
    What is the bindery?
    What is a group?
    Default users and groups

  Planning Users and Groups
    How to plan users and groups
    How to use the Users Worksheet and Group Worksheet
    How to use the User Defaults Worksheet
    For more information

  Step 1:  Determine User Names
    How to determine user names
    Guidelines

  Step 2:  Plan Hybrid Users
    What is a hybrid user?
    File access
    How to plan hybrid users
    For more information

  Step 3:  Plan Groups
    How to plan groups

  Step 4:  Plan Workgroups and Managers
    What is a workgroup?
    Types of group managers
    Workgroup Manager tasks
    User Account Manager tasks
    Comparing SUPERVISOR and manager rights
    Restrictions for planning managers
    Guidelines for delegating management responsibility
    How to plan for group managers

  Step 5:  Decide Whether to Install Accounting
    What is Accounting?
    How to plan Accounting
    Example of planning Accounting
    For more information

  Step 6:  Plan System Defaults for Defining Users
    Types of system defaults
    Effects of system defaults
    Guidelines for default account balances and restrictions
    Guidelines for default time restrictions
    Guidelines for intruder detection and lockout
    How to plan system defaults

  Step 7:  Plan Individual Account Features
    Guidelines for individual account features
    How to plan individual account features

  Examples of Planning Users, Groups, and Defaults
    Example of planning users and groups
    Sample Users Worksheet
    Sample Group Worksheet
    Example of planning user defaults
    Sample User Defaults Worksheet

  3      Planning Security

  Overview of File Server Security
    Types of file server security
    What is the NetWare security system?
    For more information

  Coordinating NetWare Security and OpenVMS Security
    Relationship of NetWare security and OpenVMS security
    Default users
    Guidelines for coordinating security
    Types of OpenVMS security checking
    How to coordinate security
    For more information

  Understanding Rights
    What are rights?
    Types of rights
    What is the Inherited Rights Mask?
    What are trustee assignments?
    How trustee assignments and the IRM work together

  Understanding Attributes
    What are attributes?
    Types of attributes
    How attributes and rights work together

  Planning NetWare Security
    How to plan NetWare security
    For more information

  Step 1:  Plan the Inherited Rights Mask

  Step 2:  Plan Trustee Assignments for Directories and Files
    Guidelines for making trustee assignments
    How to plan trustee assignments

  Step 3:  Plan Attribute Security for Directories and Files
    Guidelines for assigning attributes
    How to plan attributes

  Example of Planning Security
    Trustee assignment example
    Sample Trustee Directory Security Worksheet

  4      Planning Login Scripts

  Overview of Login Scripts
    What is a login script?
    Types of login scripts
    What are login script commands?
    How login scripts execute

  Planning Login Scripts
    How to plan login scripts
    For more information

  Step 1:  Planning the System Login Script
    Contents of system login script
    Guidelines for system login script
    Example of a system login script

  Step 2:  Planning the User Login Script
    Contents of user login script
    Guidelines for user login scripts
    Example of a user login script

  Part II    Setting Up Your System

  5      Setting Up Directories and Applications

  Setup Procedure for Directory Structure
    How to create directory structure
    For more information

  Step 1:  Create Volumes
    How to create volumes
    Restriction on volume size
    For more information

  Step 2:  Install DOS on the Network
    Before you begin
    How to install DOS on the network

  Step 3:  Create Directories
    Four ways to create directories
    How to create username directories
    How to create other directories

  Step 4:  Load Application Program Files
    Before you begin
    Guidelines for loading application program files
    How to load an application on the network
    What is a fake root directory?
    How to install an application in a fake root directory

  Step 5:  Copy Application Data Files into Directories

  Step 6:  Modify the Directories' Inherited Rights Mask (IRM)
    Default Inherited Rights Mask
    How to modify the directories' Inherited Rights Mask
    For more information

  Step 7:  Assign Attributes to Directories and Files
    Guidelines for application files
    How to assign directory and file attributes
    For more information

  6      Setting Up Users and Groups

  Setup Procedure for Users and Groups
    How to set up users and groups
    For more information

  Step 1:  Install Accounting
    When to install the Accounting feature
    Before you begin
    Setup procedure for Accounting
    How to install the Accounting feature
    How to set up an accounting server
    Types of charge rates
    How to perform other accounting tasks

  Step 2:  Set System Defaults
    When to set system defaults
    How system defaults work
    How to set system defaults

  Step 3:  Create Groups
    Guidelines for creating groups
    How to create a group and assign a full name

  Step 4:  Set Up Group Security in Files and Directories
    Setup procedure for group security
    How to assign group trustee rights in a directory
    How to assign group trustee rights to a file

  Step 5:  Create Users
    Setup procedure for users
    Menu utilities for creating users
    How to create a user
    When to assign restrictions to users
    How to assign password and login restrictions to users
    How to assign a password to a user
    How to assign station restrictions
    How to assign time restrictions
    How to create a username directory
    How to add users to a group as members

  Step 6:  Set Up User Security in Files and Directories
    Setup procedure for user security
    What is a security equivalence?
    How to designate a security equivalence
    Guideline for assigning user trustee rights to directories
    How to assign user trustee rights in a directory
    How to assign user trustee rights to a file

  Step 7:  Designate Workgroup and User Account Managers (Optional)
    Responsibility for creating users
    Prerequisites
    How to designate a user or group as Workgroup Manager
    How to designate a user or group as User Account Manager

  Step 8:  Create Hybrid Users (Optional)
    What is a hybrid user?
    Setup procedure for hybrid users
    What is the hybrid HOME volume?
    How to create user accounts
    How to designate a hybrid user
    How to configure server security for hybrid users
    Hybrid user tasks

  Step 9:  Create Login Scripts
    Utilities for creating login scripts
    Guidelines for creating login scripts
    Location of login scripts
    How to create system login scripts
    How to create user login scripts
    How to execute a system login script without executing user login scripts
    How to copy one user's login script to another user

  A   Planning Worksheets

  B   Login Script Commands

  About Login Scripts

  About Login Script Commands

  About Identifier Variables

  Conventions

  #

  ATTACH

  BREAK

  COMSPEC

  DISPLAY

  DOS BREAK

  DOS SET

  DOS VERIFY

  DRIVE

  EXIT

  FDISPLAY

  FIRE PHASERS

  GOTO

  IF...THEN...ELSE

  INCLUDE

  MACHINE

  MAP

  PAUSE

  PCCOMPATIBLE

  REMARK

  SHIFT

  WRITE

  Examples of Login Scripts
    Sample System Login Scripts
    Sample User Login Script

  EXAMPLES

  4-1        System Login Script

  4-2        User Login Script

  FIGURES

  1-1        Directory Structure

  1-2        Directory Tree Structure

  1-3        Types of Directories

  1-4        Example of Directory Structure

  1-5        Sample Directories Worksheet

  2-1        Comparing SUPERVISOR and Manager Rights

  2-2        Sample Users Worksheet

  2-3        Sample Group Worksheet

  2-4        Sample User Defaults Worksheet

  3-1        Trustee Directory Security Worksheet

  B-1        Identifier Variables

  TABLES

  1-1        Volume Types

  1-2        Directory Types

  1-3        System-Created Directories

  1-4        Characters for DOS File Names

  2-1        Guidelines for Workgroup and User Account Managers

  2-2        Guidelines for Default Account Balances and Restrictions

  2-3        Guidelines for Default Intruder Detection and Lockout

  2-4        Guidelines for Individual Account Features

  3-1        Security Checking Algorithms

  3-2        Rights

  3-3        Attributes

  3-4        Security Example Directory Trustee Assignments

  6-1        Procedure for Setting Up Users and Groups

  6-2        Procedure for Setting Up Accounting

  6-3        Guidelines for Creating Groups

  6-4        Menu Utilities for Creating Users

  6-5        Utilities for Creating Login Scripts