CONTENTS Title Page Copyright Page Preface 1 Overview 1.1 Overview of ACA Services 1.2 Key Files 1.3 System Management Responsibilities 2 Customizing the ACA Services Environment 2.1 Key Components of ACA Services 2.1.1 System Context Object 2.1.2 System Class Repository 2.1.3 Control Server 2.1.4 DDE Broker 2.2 Determining the Needs of Your System 2.3 Transports 2.4 Providing Services to Other Nodes 2.4.1 Server Node Setup Tasks 2.4.2 Client Node Setup Tasks 2.5 Security 2.5.1 Authentication 2.5.1.1 Changing Authentication 2.5.2 Security and Process Management Commands 2.6 Verification 2.6.1 Cross-Node Communication 2.6.2 Local Server Startup and Method Invocation 3 Ongoing Maintenance 3.1 System Management Account 3.2 New Nodes, Users, and Proxies 3.3 Purging the System Class Repository and the Context Object 3.4 Control Server Log File 3.5 SAK Files 3.6 Method Server Statuses 3.7 Stopping Method Servers 3.8 Purging Method Servers 3.9 Debugging Server Startup 3.10 Applications 3.11 Restarting ACA Services 3.11.1 VMScluster Considerations 4 Additional Features and Capabilities 4.1 Flexibility in Proxy Definitions 4.2 Names Registry 4.3 Updating the System Startup File 4.4 Applications and Group Context Objects 5 Limitations and Troubleshooting 5.1 Internet 5.2 UCX 5.3 DECnet and TCP/IP Limitations 6 System Management Commands LOAD CLASSES LOAD CONTEXT_OBJECT SET CTRL_SERVER SHOW CTRL_SERVER SHOW SERVERS STOP CTRL_SERVER STOP SERVER_PROCESS STOP SESSION FIGURES 6-1 Using the ADD Switch TABLES 1 Symbol Conventions 2 Typeface Conventions 1-1 OpenVMS Directories and File Names 2-1 Values for the ACAS_AUTHENTICATION Attribute 2-2 Relationship between Transport, Authentication, and Proxy Style 2-3 Process Management Command Security 3-1 Method Server Statuses