skip book previous and next navigation links
go up to top of book: HP OpenVMS Guide to System Security HP OpenVMS Guide to System Security
go to beginning of part: Security for the System Administrator Security for the System Administrator
go to beginning of chapter: Using Protected Subsystems Using Protected Subsystems
go to previous page: Enabling Protected Subsystems on a Trusted Volume Enabling Protected Subsystems on a Trusted Volume
go to next page: Example of a Protected SubsystemExample of a Protected Subsystem
end of book navigation links

Giving Users Access  



All users with execute access to the main application image of the subsystem can use the data files and other objects under control of the subsystem if the subsystem allows the access. However, managers of the subsystem can restrict access to objects of the subsystem in the following ways:

Remember that as long as users are executing the application image for the subsystem, their process rights list contains the subsystem identifier as well as their normal identifiers. However, as soon as users interrupt or exit from the application, their process rights list loses the subsystem identifier, and they lose access rights to the objects in the subsystem. Subsystem identifiers are not propagated by default when subprocesses are spawned.


go to previous page: Enabling Protected Subsystems on a Trusted Volume Enabling Protected Subsystems on a Trusted Volume
go to next page: Example of a Protected SubsystemExample of a Protected Subsystem