skip book previous and next navigation links
go up to top of book: HP OpenVMS Guide to System Security HP OpenVMS Guide to System Security
go to beginning of part: Security for the System Administrator Security for the System Administrator
go to beginning of chapter: Using Protected Subsystems Using Protected Subsystems
go to previous page: Applications for Protected Subsystems Applications for Protected Subsystems
go to next page: Design ConsiderationsDesign Considerations
end of book navigation links

How Protected Subsystems Work  



A protected subsystem is an application that, when run, causes the process running the application to be granted one or more identifiers. For as long as a user runs the subsystem, the user's process rights list carries these additional identifiers. How Protected Subsystems Differ from Normal Access Control shows how a protected subsystem adds a second level of access control to traditional controls. 

Figure 1  How Protected Subsystems Differ from Normal Access Control  
tbs

Users with execute access to the application gain access to the subsystem. Once in the subsystem, users can work with the data files and other resources of the subsystem.

A subsystem can have several identifiers because the resources consumed by the subsystem (the files, printers, and so forth) can be protected differently.

Possession of subsystem identifiers is limited to the period users are executing the application. Once the users exit from the application, the identifiers are removed from their process rights lists. Subsystem identifiers are also removed from the rights list whenever users enter a Ctrl/Y sequence or attempt to create a subprocess with the DCL command SPAWN. (In this respect, use of the subsystem identifiers is identical to the operation of images installed with privileges.)

The following identifiers are reserved for use in the security subsystem and should not be granted to any user:


go to previous page: Applications for Protected Subsystems Applications for Protected Subsystems
go to next page: Design ConsiderationsDesign Considerations