( PERSONA (Assume persona of another user)5 Copyright  1999 - Lyle W. West  All rights reserved.    ------------------------------E PERSONA is a rewrite and enhancement of the GLOGIN utility written by ; Anthony C. McCracken, Northern Arizona University, in 1992.   B PERSONA uses the PTD$ routines supplied by VMS and may not work on older versions of VMS. ------------------------------  F PERSONA lets privileged users log in to a named account without havingC to know the password for that account.  A process running under the A target username is created.  Its input and output are read from a 0 pseudo-terminal, which is controlled by PERSONA.  @ Unlike BECOME and SWAP, the process created by PERSONA is a fullA process, with all the privileges, rights identifiers, quotas, DCL E symbols, logical names, etc., as well as anything else that is set up  in the target user's LOGIN.COM.   A PERSONA requires the target username as a parameter.  Logging out B of the PERSONA account returns the terminal device and user to the( person which originally invoked PERSONA.  9 You must can set up a DCL foreign command to run PERSONA:   + 	$ persona :== $disk:[directory]PERSONA.EXE   ' To log in as user SYSTEM, simply issue:    	$ persona system   F The effect will be similar to using SET HOST 0 or TELNET to connect toD local system, except there will be no Username and Password prompts.  E PERSONA will, by default, check the rights database for an identifier D granted to invoking user in the form of PERS_xxxx, where xxxx is theG target username. If the identifier is not granted to the invoking user, G a message indicating user is not authorized to assume the target user's 	 persona.    F Additionally, if the identifier exists, the invoking process name willD be changed to PERS_xxxxxxxx, where xxxxxxxx is the process id of theE detached process. This permits tracing the origin of multiple PERSONA  users.  F The identifier can be circuvented by use of the /IGNOREID command line> qualifier, where the user is then prompted to enter the system manager's password.   I Much of the top portion of this document was stolen from Hunter Goatley's 3 HGLOGIN bliss implementation, also based on GLOGIN. 