Three levels of authority checking are available for a device:
none
,
terminal
, and
user
. These authority levels are
described in the following sections.
When discussing authority levels, one must also discuss the login process. An authority level with login enabled
yields different authority checking results than the same authority level with login disabled.
Combinations (or modes) of authority checking and login are illustrated in Table 3-7 .
3.8.3.2.2 No Authority Checking
Authority checking is disabled (none) by default. With authority checking disabled, all input requests are honored
and no command logging is performed.
Login is also disabled by default. If login is desired, it is recommended that the administrator first establish terminal
level or user level authority checking. Refer to Section 3.8.4 , Authority Administration, for details.
3.8.3.2.3 Terminal Authority Checking
With terminal authority checking, the user is restricted to executing only those commands belonging to commands
groups allowed on the particular terminal. The terminal may have no restrictions. In this case logging and/or
reporting is still performed, but any command may be executed.
3.8.3.2.4 User Authority Checking
With user authority checking, restrictions can differ between the case where login is enabled and the case where it
is not.
With login disabled, the user is restricted to commands belonging to command groups assigned to the terminal (this
is the same as terminal authority checking).
With login enabled, the user is restricted to commands belonging to command groups assigned to both the terminal
and their user identity (exception to this is noted in the following paragraph). If both restrictions are met, the
command is executed.
3.8.3.2.5 SUPERUSR Capabilities
Terminal restrictions for SUPERUSR can be accomplished by setting the ECD getty form field 10 to "t". This restricts
the SUPERUSR command group (comgr) to the capabilities assigned to the specific terminal device.
Bypassing terminal restrictions for SUPERUSR is accomplished by setting the getty form field 10 to "u".
3.8.3.2.6 Authority Checking Summary
Table 3-7 illustrates and summarizes the various combinations (or modes) of login and authority checking
described in the previous sections.
Table 3-7
Authority Checking Combinations or Modes
AUTHORITY
LOGIN/PASSWORD (SEE LEGEND)
LEVEL
YES
NO
u - (user)
a
b
t - (terminal)
c
d
n - (none)
e
f
Notes:
a.
Devices configured with both login and
user
authority checking (`u') enabled initially display the login prompt. In this
235-105-210
October 1999
Copyright © 1999
Page 23
Summary of Contents for 5ESS-2000
Page 96: ...235 105 210 October 1999 Copyright 1999 Page 2 ...
Page 184: ...235 105 210 October 1999 Copyright 1999 Page 3 ...
Page 300: ...13 STOP YOU HAVE COMPLETED THIS PROCEDURE 235 105 210 October 1999 Copyright 1999 Page 55 ...
Page 339: ...7 STOP YOU HAVE COMPLETED THIS PROCEDURE 235 105 210 October 1999 Copyright 1999 Page 13 ...
Page 342: ...235 105 210 October 1999 Copyright 1999 Page 2 ...
Page 359: ...235 105 210 October 1999 Copyright 1999 Page 5 ...
Page 609: ...2 STOP YOU HAVE COMPLETED THIS PROCEDURE 235 105 210 October 1999 Copyright 1999 Page 12 ...
Page 676: ...235 105 210 October 1999 Copyright 1999 Page 9 ...
Page 792: ...3 STOP YOU HAVE COMPLETED THIS PROCEDURE 235 105 210 October 1999 Copyright 1999 Page 9 ...
Page 799: ...Figure 11 36 3 1 Cleaning Points 235 105 210 October 1999 Copyright 1999 Page 7 ...
Page 801: ...235 105 210 October 1999 Copyright 1999 Page 9 ...
Page 839: ...2 STOP YOU HAVE COMPLETED THIS PROCEDURE 235 105 210 October 1999 Copyright 1999 Page 16 ...
Page 999: ...2 STOP YOU HAVE COMPLETED THIS PROCEDURE 235 105 210 October 1999 Copyright 1999 Page 13 ...
Page 1008: ...Figure 11 55 1 CTSNS DIP Switch Settings 235 105 210 October 1999 Copyright 1999 Page 2 ...
Page 1011: ...235 105 210 October 1999 Copyright 1999 Page 5 ...
Page 1053: ...235 105 210 October 1999 Copyright 1999 Page 15 ...
Page 1289: ...Figure 15 17 2 AMATPS Data Link 235 105 210 October 1999 Copyright 1999 Page 2 ...
Page 1292: ...235 105 210 October 1999 Copyright 1999 Page 5 ...
Page 1303: ...9 STOP YOU HAVE COMPLETED THIS PROCEDURE 235 105 210 October 1999 Copyright 1999 Page 2 ...
Page 1360: ...Figure 15 47 2 Typical SCANS III Link Diagram 235 105 210 October 1999 Copyright 1999 Page 2 ...
Page 1372: ...235 105 210 October 1999 Copyright 1999 Page 2 ...
Page 1374: ...235 105 210 October 1999 Copyright 1999 Page 4 ...
Page 1421: ...Table 1 1 O M Checklist 235 105 210 October 1999 Copyright 1999 Page 3 ...