skip book previous and next navigation links
go up to top of book: HP OpenVMS Guide to System Security HP OpenVMS Guide to System Security
go to beginning of part: Security for the User Security for the User
go to beginning of chapter: Descriptions of Object Classes Descriptions of Object Classes
go to previous page: Common Event Flag Clusters Common Event Flag Clusters
go to next page: FilesFiles
end of book navigation links

Devices  



A device is a peripheral, physically connected or logically known to a processor and capable of receiving, storing, or transmitting data. A device can be physical, like a disk or terminal, or it can be virtual, like a mailbox or pseudoterminal. Virtual devices are implemented entirely in software. Virtual terminals are considered LOCAL devices. They can be created over the network or on the local system.

Naming Rules  

You can use physical, logical, or generic names to refer to devices. In addition, if your system is part of a clustered system, certain devices are accessible to all members of the cluster. They have the following formats:

See the HP OpenVMS System Manager's Manual and the HP OpenVMS User's Manual for a full description of device names.

Types of Access  

Devices can be shared and thus have concurrent users or be unshared and have a single user.

Shared devices support the following types of access:

Read
Gives you the right to read data from the device
Write
Gives you the right to write data to the device
Physical
Gives you the right to perform physical I/O operations to the device
Logical
Gives you the right to perform logical I/O operations to the device
Control
Gives you the right to change the protection elements and owner of the device

Unshared devices support only read, write, and control access. The device driver rather than the operating system's security policy defines the access requirements for other types of operations.

Access Requirements for I/O Operations  

Access requirements for I/O operations on devices can be quite complex. The following list explains access requirements for typical operations:

Template Profile  

The device class provides the following template profiles:

Template Name Device Type Owner UIC Protection Code
BUS
DC$_BUS
[SYSTEM]
S:RWPL,O:RWPL,G,W
CARDREADER
DC$_CARD
[SYSTEM]
S:RWPL,O:RWPL,G,W
COMMUNICATION
DC$_SCOM
[SYSTEM]
S:RWPL,O:RWPL,G,W
DEFAULT

[SYSTEM]
S:RWPL,O:RWPL,G:RWPL,W:RWPL
DISK
DC$_DISK
[SYSTEM]
S:RWPL,O:RWPL,G:R,W
MAILBOX
DC$_MAILBOX
[SYSTEM]
S:RWPL,O:RWPL,G:RWPL,W:RWPL
PRINTER
DC$_LP
[SYSTEM]
S:RWPL,O:RWPL,G,W
REALTIME
DC$_REALTIME
[SYSTEM]
S:RWPL,O:RWPL,G:RWPL,W:RWPL
TAPE
DC$_TAPE
[SYSTEM]
S:RWPL,O:RWPL,G:R,W
TERMINAL
DC$_TERM
[SYSTEM]
S:RWPL,O:RWPL,G,W
WORKSTATION
DC$_WORKSTATION
[SYSTEM]
S:RWPL,O:RWPL,G:RWPL,W:RWPL

Setting Up Profiles for New Devices  

A device usually derives its security profile from the template profile associated with its device type; however, the template is often modified. The following list describes how the operating system assigns a profile to different types of devices:

Privilege Requirements  

All logical or physical I/O to a spooled device requires privilege.

The LOG_IO privilege allows the user's process to execute the Queue I/O Request ($QIO) system service to perform logical-level I/O operations. LOG_IO privilege is also required for certain device-control functions, such as setting permanent terminal elements.

The PHY_IO privilege allows the user's process to execute the Queue I/O Request ($QIO) system service to perform physical-level I/O operations. The PHY_IO privilege also grants LOG_IO privilege.

To create a permanent mailbox or mark it for deletion requires PRMMBX privilege.

Kinds of Auditing Performed  

The following types of events can be audited, provided the security administrator enables auditing for the appropriate event class:

Event Audited When Audit Occurs
Access
For nonshareable devices, when the process calls $ASSIGN; for a shareable device, when the process calls $QIO
Creation
When a process creates a virtual device like a mailbox
Deletion
When a process deletes a virtual device like a mailbox

Permanence of the Object  

The profile of clusterwide disks and tapes is stored in the object database VMS$OBJECTS.DAT, but other object profiles have to be reset each time the system starts up.


go to previous page: Common Event Flag Clusters Common Event Flag Clusters
go to next page: FilesFiles