JAMS Reference Manual
Contents Index JAMS Home Support

JAMS Reference Manual


Previous Contents Index

1.14 Access Control

Access Control Lists are used to define access restrictions for various capabilities within the JAMS system. JAMS access control makes use of OpenVMS Access Control Lists, also known as ACLs. Refer to the OpenVMS documentation for more information on Access Control Lists.

An ACL is a list of Access Control Entries (or ACEs). An ACE consists of one or more identifiers and the types of access to be granted to users which match the identifiers.

The identifier field can contain one or more user identifiers separated by a plus sign (+). Identifiers can take any of the following forms:

These identifiers can be combined, for example, "[100,*]+PAYROLL_USER" will only match users in UIC group 100 who have the PAYROLL_USER rights identifier.

When JAMS checks to determine if a user can perform a function, it will start at the top of the ACL and check the identifiers specified in each ACE against the identifiers held by the user. When a match is found, the user is granted only the access specified on the ACE which matched, subsequent ACEs in the list are not checked. If the end of the list is reached without finding a match, no access is granted.

The Access fields on the ACE Maintenance Screen will vary based on the function whose security you are modifying. The Access fields accept a Y (yes) or N (no) entry to either grant or deny the specified access capability. The Access capabilities for each of the security functions are explained in the following sections.

1.14.1 History Inquiry

History Inquiry has only one security option, Inquiry. You can either grant or deny access to the History Inquiry application.

1.14.2 Job Monitor Access

Job Monitor security has the following access types:
Access Description
Execute Allows access to the Job Monitor. Only Jobs which the user has MONITOR access to will be displayed. MONITOR access is defined in the Jobs System definition.
See_All_Jobs Allows access to the Job Monitor and the ability to monitor jobs submitted by anyone.
See_Own_Jobs Allows access to the Job Monitor but only jobs submitted by the user running the monitor will be displayed.
Operator Allows a person to reschedule, hold, release and delete any job which is on their display.
Abort_Jobs Allows a person to abort and restart any job which is on their display.

Monitor capabilities are also controlled by System definitions. For example, you could grant someone SEE_ALL_JOBS access to the Job Monitor which would let them monitor all batch jobs. Then each System definition could define whether or not the user can manage or abort Jobs which are in the System.

1.14.3 Setup Definitions

Setup Definitions has the following access types:
Access Description
Add Allows addition of new Setup definitions
Change Allows modification of existing Setup definitions
Inquire Allows inquiry into Setup definitions
Delete Allows deletion of Setup definitions

Setup definitions are also controlled by the Access Control List of each System definition. To create a Setup, you need to have ADD access to Setup definitions and you must have SUBMIT access to the System to which the Setup's Job definition belongs and, DEFINE_SETUP access to the System to which the Setup definition belongs.

The SUBMIT and DEFINE_SETUP access rights are defined for each System definition. Refer to the Section 1.2, System Definitions for more information on Systems and their security.

1.14.4 Job Definitions

The Job Definitions function has the following access types:
Access Description
Add Allows addition of new Job definitions
Change Allows modification of existing Job definitions
Inquire Allows inquiry into Job definitions
Delete Allows deletion of Job definitions

Job definitions are also controlled by the Access Control List of each System definition. To create a Job, you need to have ADD access to Job definitions, and you must have JOB_ADD access to the System to which the Job belongs. Similarly, to modify, delete or inquire into a Job definition, you must have the corresponding JOB_CHANGE, JOB_DELETE or JOB_INQUIRE access right for the System to which the Job belongs.

Refer to the Section 1.2, System Definitions for more information on Systems and their security.

1.14.5 System Definitions

System Definitions has the following access types:
Access Description
Control Allows modification of a Systems individual ACL
Add Allows addition of new System definitions
Change Allows modification of existing System definitions
Inquire Allows inquiry into System definitions
Delete Allows deletion of System definitions

Each System Definition has it's own access control information. This ACL can be viewed and/or modified from the System Definitions menu option.

Note that in order to modify, delete or view a System definition, you must have CHANGE, DELETE or INQUIRE access to System definitions and CHANGE, DELETE or INQUIRE access to the specific System definition which you want to manipulate.

1.14.6 Menu Definitions

Menu Definitions has the following access types:
Access Description
Add Allows addition of new Menu definitions
Change Allows modification of existing Menu definitions
Inquire Allows inquiry into Menu definitions
Delete Allows deletion of Menu definitions

1.14.7 Variable Definitions

The Variable Definitions function has the following access types:
Access Description
Control Allows modification of Variables individual ACLs, provided that the Variables individual ACL also grants CONTROL.
Add Allows addition of new Variable definitions
Change Allows modification of existing Variable definitions
Inquire Allows inquiry into Variable definitions
Delete Allows deletion of Variable definitions

Each Variable has an individual ACL which is used to protect only that Variable.

1.14.8 Trigger Definitions

The Trigger Definitions function has the following access types:
Access Description
Reset Allows use of the RESET command.
Manage Allows use of the ENABLE and DISABLE commands.
Add Allows addition of new Trigger definitions
Change Allows modification of existing Trigger definitions
Inquire Allows inquiry into Trigger definitions
Delete Allows deletion of Trigger definitions

1.14.9 Date Definitions

Date Maintenance has the following access types:
Access Description
Add Allows addition of new Date definitions
Change Allows modification of existing Date definitions
Inquire Allows inquiry into Date definitions
Delete Allows deletion of Date definitions

1.14.10 Configuration

Configuration has only one security option, Execute. You can either grant or deny access to the Configuration application.

1.14.11 Date Type Definitions

Date Type Maintenance has the following access types:
Access Description
Add Allows addition of new Date Types
Change Allows modification of existing Date Types
Inquire Allows inquiry into Date Types
Delete Allows deletion of Date Types

1.14.12 Access Control

Access Control has two security options, Execute and Inquiry. Execute access grants the ability to manipulate the Access Control Lists for all security options.

1.14.13 Node Definitions

The Node Maintenance security option controls the ability to access Node and Node Group definitions. Node Maintenance has the following access types:
Access Description
Add Allows addition of new Node definitions
Change Allows modification of existing Node definitions
Inquire Allows inquiry into Node definitions
Delete Allows deletion of Node definitions

1.14.14 Named Times Access

The Named Times Access security option controls the ability to access Named Time Definitions. Named Time Access has the following access types:
Access Description
Manage Allows access to the ENABLE TIME and DISABLE TIME commands
Add Allows addition of new Named Time definitions
Change Allows modification of existing Named Time definitions
Inquire Allows inquiry into Named Time definitions
Delete Allows deletion of Named Time definitions

1.14.15 Username Access

The Username Access security option controls the ability to use the SET USERNAME and EXTRACT USERNAME commands. Username Access has the following access types:
Access Description
Execute Allows use of the SET USERNAME command
Inquire Allows use of the EXTRACT USERNAME

1.14.16 Resource Access

The Resource Access security option controls the ability to access Resource Definitions. Resource Access has the following access types:
Access Description
Add Allows addition of new Resource definitions using the CREATE RESOURCE/NOREPLACE command
Change Allows modification of existing Resource definitions using the CREATE RESOURCE/REPLACE or the SET RESOURCE commands
Inquire Allows inquiry into existing Resource definitions using the EXTRACT RESOURCE or SHOW RESOURCE commands
Delete Allows deletion of Resource definitions using the DELETE RESOURCE command


Previous Next Contents Index
JAMS Copyright © 2000, MVP Systems, Inc. All rights reserved.