HP OpenVMS Systems Documentation

Content starts here

OpenVMS Programming Concepts Manual

Previous Contents Index

Chapter 29
29 Using the Distributed Transaction Manager
     29.1     Introduction to DECdtm Services
         29.1.1         Sample Atomic Transaction
         29.1.2         Transaction Participants
         29.1.3         DECdtm System Services
         29.1.4         Default Transactions
     29.2     Calling DECdtm System Services
     29.3     Using DECdtm Services: An Example
Chapter 30
30 Creating User-Written System Services
     30.1     Overview
     30.2     Writing a Privileged Routine (User-Written System Service)
     30.3     Creating a Privileged Shareable Image (VAX Only)
         30.3.1         Creating User-Written Dispatch Routines on VAX Systems
         30.3.2         Creating a PLV on VAX Systems
         30.3.3         Declaring Privileged Routines as Universal Symbols Using Transfer Vectors on VAX Systems
     30.4     Creating a User-Written System Service (Alpha Only)
         30.4.1         Creating a PLV on Alpha Systems
         30.4.2         Declaring Privileged Routines as Universal Symbols Using Symbol Vectors on Alpha Systems
Chapter 31
31 System Security Services
     31.1     Overview of the Operating System's Protection Scheme
     31.2     Identifiers
         31.2.1         Identifier Format
         31.2.2         General Identifiers
         31.2.3         System-Defined Identifiers
         31.2.4         UIC Identifiers
         31.2.5         Facility Identifiers
         31.2.6         Identifier Attributes
     31.3     Rights Database
         31.3.1         Initializing a Rights Database
         31.3.2         Using System Services to Affect a Rights Database
                Translating Identifier Values and Identifier Names
                Adding Identifiers and Holders to the Rights Database
                Determining Holders of Identifiers
                Determining Identifiers Held by a Holder
                Modifying the Identifier Record
                Modifying a Holder Record
                Removing Identifiers and Holders from the Rights Database
         31.3.3         Search Operations
         31.3.4         Modifying a Rights List
     31.4     Persona (Alpha Only1)
         31.4.1         Impersonation Services (Alpha Only)
                Using Impersonation System Services
         31.4.2         Per-Thread Security (Alpha Only)
                Previous Security Model
                Per-Thread Security Model
         31.4.3         Persona Extensions (Alpha Only)
     31.5     Managing Object Protection
         31.5.1         Protected Objects
         31.5.2         Object Security Profile
                Displaying the Security Profile
                Modifying the Security Profile
         31.5.3         Types of Access Control Entries
                Design Considerations
                Translating ACEs
                Creating and Maintaining ACEs
     31.6     Protected Subsystems
     31.7     Security Auditing
     31.8     Checking Access Protection
         31.8.1         Creating a Security Profile
         31.8.2         SYS$CHKPRO System Sevice
         31.8.3         SYS$CHECK_ACCESS System Service
     31.10     Implementing Site-Specific Security Policies
         31.10.1         Creating Loadable Security Services
                Preparing and Loading a System Service
                Removing an Executive Loaded Image
         31.10.2         Installing Filters for Site-Specific Password Policies
                Creating a Shareable Image
                Installing a Shareable Image
Chapter 32
32 Logical Name and Logical Name Tables
     32.1     Logical Name System Services and DCL Commands
         32.1.1         Logical Names, Equivalence Names, and Search Lists
         32.1.2         Logical Name Tables
                Logical Name Directory Tables
                Process, Job, Group, System and Clusterwide Default Logical Name Tables
                        Process Logical Name Table
                        Job Logical Name Table
                        Group Logical Name Table
                        System Logical Name Table
                        Clusterwide Logical Name Table
         32.1.3         Logical Name Table Names and Search Lists
         32.1.4         Specifying the Logical Name Table Search List
     32.2     Creating User-Defined and Clusterwide Logical Name Tables
         32.2.1         Creating Clusterwide Logical Name Tables
     32.3     Checking Access and Protection
     32.4     Specifying Access Modes
     32.5     Translating Logical Names
     32.6     Specifying Attributes
     32.7     Establishing Logical Name Table Quotas
         32.7.1         Directory Table Quotas
         32.7.2         Default Logical Name Table Quotas
         32.7.3         Job Logical Name Table Quotas
         32.7.4         User-Defined Logical Name Table Quotas
     32.8     Interprocess Communication
     32.9     Using Logical Name and Equivalence Name Format Conventions
     32.10     Using Logical Names and Logical Name Table System Services in Programs
         32.10.1         Using SYS$CRELNM to Create a Logical Name
         32.10.2         Using SYS$CRELNT to Create Logical Name Tables
         32.10.3         Using SYS$DELLNM to Delete Logical Names
         32.10.4         Using SYS$TRNLNM to Translate Logical Names
         32.10.5         Using SYS$CRELNM, SYS$TRNLNM, and SYS$DELLNM in a Program Example

Previous Next Contents Index