![]() |
||||
|
Previous | Contents | Index |
Extract one or more JAMS Security Access Control Lists.
EXTRACT SECURITY security-name
security-name
The name of the JAMS Security ACL which is to be extracted. If you do not supply a Security Name, all of the ACL's are extracted. Valid names are:
CONFIGURATION Access to JAMS configuration. DATES Access to Date definitions DTYPES Access to Date Type definitions. HISTORY Access to History Inquiry. JOBS Access to Job definitions. MENUS Access to Menu definitions MONITOR Access to Job Monitor. NODES Access to Node definitions. RESOURCE Access to Resource definitions. SECURITY Access to Security settings. SETUPS Access to Setup definitions. SYSTEMS Access to System definitions. TIMES Access to Named Time definitions. TRIGGERS Access to Trigger definitions USERNAMES Access to Username access control. VARIABLES Access to Variable definitions.
The EXTRACT SECURITY command is used to extract a complete Security Definition. This definition can be used to replicate the ACL on another VMScluster.
You must have INQUIRE access to Access Control.related commands
/CONFIRM
This qualifier is used to specify that you want to be prompted to confirm the extraction of each ACL./LOG
This qualifier can be used to specify that each extraction should be logged by displaying a message on SYS$OUTPUT./OUTPUT=file_name
Specifies the name of a file where the definitions will be written. If you do not specify the /OUTPUT qualifier, the definitions are written to SYS$OUTPUT.
Previous | Next | Contents | Index |
![]() | Copyright © 2000, MVP Systems, Inc. All rights reserved. |