Browse Prior Art Database

Method to Report Access Control of LAN Server Resources on a Per User Basis

IP.com Disclosure Number: IPCOM000108002D
Original Publication Date: 1992-Apr-01
Included in the Prior Art Database: 2005-Mar-22
Document File: 1 page(s) / 44K

Publishing Venue

IBM

Related People

Easter, C: AUTHOR

Abstract

In administration of several OS/2* LAN Servers, the command line is sometimes more efficient. Moreover, the administrator can create their own tools using the REXX programming language. This article describes a method of reporting by user ID the access each ID has to resources defined in a LAN Server domain.

This text was extracted from an ASCII text file.
This is the abbreviated version, containing approximately 74% of the total text.

Method to Report Access Control of LAN Server Resources on a Per User Basis

       In administration of several OS/2* LAN Servers, the
command line is sometimes more efficient.  Moreover, the
administrator can create their own tools using the REXX programming
language.  This article describes a method of reporting by user ID
the access each ID has to resources defined in a LAN Server domain.

      The command file is a REXX program that takes the user ID names
as a parameter passed on the command.  This user ID name is checked
to make sure it is a valid name, and the name is then used as
the report file name. EXAMPLE: If the user name is JOESMITH, then the
report name is JOESMITH.FIL.

      A user may have access to a LAN Server resource based on the
groups the user belongs to and based on the user ID name
specifically.  Therefore, the report file lists resources whose
access control profile contains either a group name the user ID
belongs to or the user ID.

      OS/2 LAN Server resources can be given nicknames, called
aliases.  These alias names can have attributes associated with them.
These attributes are:  Access Control Profiles, When Shared, Maximum
Number of concurrent users, comment string.

      The program processes each alias and checks the access control
profile.  Each occurrence of the specified name or the group name in
the access control profile is entered in the report so that if a user
has specific access and access by group...