| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| SYSTEM PARAMETER |
Select System Parameters from the TK-GUARDIAN Security Maintenance Menu.
In it there are three utilities which are used to maintain system-wide
parameters for the TK-GUARDIAN software.
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| Basic Parameter |
Select Basic Parameters
by moving the pointer to the first option
and pressing [RETURN]. An example of this screen is provided below.
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| Enable User Security |
It is possible to turn off that part of TK-GUARDIAN security which
requires identification of users at logon. If this parameter is set to NO , logon will not be required by TK-GUARDIAN, no screening of menu options based on identity will be performed, and access to the menu system will be immediate. When the parameter is set to YES , users will be required to identify themselves at the logon screen prior to gaining access to the menu system. Device-oriented security will be unaffected by the status of user security.
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| Enable Two-Stage Logon |
In its default state, TK-GUARDIAN uses a single stage logon in which the
user identifies himself (or herself) and passes security in one step, by
entering a unique password. Because the password is unique to the system,
TK-GUARDIAN can identify the user through its use. However, many sites have already become familiar with a two step approach in which users identify themselves first, then enter a password which must match the password assigned to them. If this is the preferred approach to logon security, then you should enter YES in this field.
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| Logon Screen Timeout |
The screen which is displayed prior to entering the TK-GUARDIAN menu
system at which users identify themselves by password times out after the
period of time (expressed in seconds) entered in this field. A value
greater than 9 seconds, and less than 28,801 seconds (8 hours) is
expected. If security provisions have disabled direct mode (or programming mode) for this device, the screen will clear after timeout has occurred, a terminating message will be displayed, and the job halted. If direct mode is enabled when timeout occurs, TKGUARDIAN will quit, but not halt the job. Control will be passed to MUMPS. NOTE: Some MUMPS environments allow a job's status to be changed from "tied" to "free" during a session. Others do not. If you encounter problems with this feature, please call us. We will gladly provide more specific information. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| Enable Device Security |
In some environments, location- or device-oriented security is not
desired; in others it is not feasible. One environment in which device
security is not feasible is in a network environment in which logon at the
same system device ($I) cannot be guaranteed. When this parameter is set to NO , no screening of menu options will be done based on the location of the device and logon will not be denied. When set to YES , screening of menu selections will be performed based on the location of the device on which the user is attempting to log on. The specifics of the security at any location are maintained in the Device Maintenance screens which will be covered later in this manual.
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| Display Secured Menu Options |
TK-GUARDIAN provides an opportunity, at the system level, to decide
whether menu options which have been screened out for a particular user or
location should be displayed. If this parameter is set to YES , all menu options will be displayed whether or not they can be accessed by the user at the time. If set to NO , only those menu options which can be accessed by the user will be displayed.
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| Pre Logon Routine |
In some systems, there is a need to do external processing at logon, such
as displaying bulletin board type information. This can easily be done by
indicating to TK-GUARDIAN the name of the MUMPS routine to be called. A
routine defined here will be called prior to allowing the user to logon.
Be sure to include the "^" in front of the routine name.
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| Post Logon Routine |
This field also permits you to define the name of a routine which
TK-GUARDIAN will call. In this case the call will be made after the user
has successfully logged on, but before the Master Menu is displayed.
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| Exit Message Routine |
By entering the name of the routine here, it is possible to have
TK-GUARDIAN call a routine which displays an Exit Message. In most cases
this message will remain on the screen until the next logon is attempted.
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| Exit Basic Parameters |
When finished with this screen, you can return to the menu system by
pressing the EXIT key or by simply pressing [RETURN] through all of the
fields. You can determine which keys serves the EXIT function on your
terminal by pressing a ?
at any menu in the TK-GUARDIAN system. In
any case, it will be the same EXIT key used in other PG&A Toolkit software
which may be running on your system.
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| USER INFORMATION |
Select User Information from the System Parameters menu by pointing to the
second option and pressing [RETURN]. An example of this screen is
provided below.
The user information screen provides the ability to define the contents of your system's user database. Each field defined on this screen will become part of the user data entry screen discussed later.
NOTE: The row on which the field appears determines where the user data will be stored in the user database. Therefore, it is important to fill in and adjust this screen to your liking prior to entering any user information. The row on which the field appears cannot be changed later. Field Name |
As shown in the example, enter the field name in the first column.
Remember that the field name will also be used as a prompt in the user
data entry screen. |
Field Length |
Enter the maximum length of the data to be entered for this field. The
maximum value which can be entered here is 56. |
Field Pattern Match Code |
If you would like the data entered to match a particular pattern enter the
validation code here. The sample screen above shows several examples for
you to follow. Notice that the name of the variable which will contain
the data is 'X', and that standard MUMPS pattern matching syntax is
required. | There is no method for making the entry of information into the field mandatory. And, if no data is entered, the validation code will not be executed.
Field Include |
Enter a Y
for each of up to three fields which you want to be
displayed for identification purposes during user lookup. This screen
does not prevent you from entering a Y
in all the fields. However,
only the first three encountered will be used. | All of the fields may be modified after user data has been entered. Only the row on which the field definition data was entered may not be changed later.
Exit User Information |
When finished with this screen, return to the menu system by pressing the
EXIT key. | If you press EXIT once too often and find yourself back in direct mode, fear not. Simply, enter...
DO ^TKGUwhich is the startup program for TK-GUARDIAN. Hint: don't forget your password.
EDIT LOGON
SCREEN |
Select Edit Login Screen
from the System Parameters screen. This
screen editor works very much like the Toolkit I utility TK-PAINT. There
are however, minor differences. | This editor provides the ability to design your own logon screen. The resulting screen is then used by all terminals requiring user logon.
Moving the Cursor
|
Text and drawings can be entered anywhere on the 24 X 80 screen. Cursor
movement is directed using the cursor keys while the [RETURN] key moves
the cursor to the left edge of the screen on the same line. Notice that
current row and column are displayed at the bottom right of the screen.
| Use [SPACE] to erase unwanted characters or drawings.
Video Modes |
To enable line drawing and the use of various video attributes, several
video modes are provided which include: |
If a mode indicator is not entered, the reverse mode becomes active. For example, if in high intensity mode and [R] is entered, the resulting mode will be low intensity reverse video because [H] was not entered. Pressing [RETURN] after entering no indicators will result in low intensity, normal video with underlining off.
Line Drawing |
To change from Text mode to Line Drawing mode press the [TAB] key.
Creating a box or other line drawing is accomplished easily using the
cursor keys. | Try it. You will quickly get the feel for it. When you have finished your line drawing, press [TAB] again to return to text mode.
NOTE:From time to time the editor does not put the desired line drawing character where you wanted it. You can force other line drawing characters from text mode by moving the cursor to the position you want changed and pressing [CTRL][A]. Each time you press [CTRL][A], another line drawing character will be displayed. When satisfied, just move the cursor away from the position.
Setting Cursor Position |
The TK products do not attempt to turn the cursor off during login.
Therefore, a cursor will be displayed while users enter their password.
The location of the cursor during this time is up to you. | On the logon screen provided with TK-GUARDIAN, you will notice a bright @P . This indicates the current location of the cursor during password entry. This is true whether single or two-stage logon has been selected in Basic Parameters. The location can be easily moved by placing the cursor in the desired position and pressing [CTRL][P]. If you have selected two-stage logon in Basic Parameters, it is also necessary to indicate the cursor location during entry of the User Identification. This position is indicated on the screen by a bright @U and can be moved by placing the cursor in the desired position and pressing [CTRL][U]. Exiting |
When the edit session has been completed, press the EXIT key. TK-GUARDIAN
will quickly compile your screen for each of the terminal type(s) defined
for your system and return you to the menu.
| MENU MAINTENANCE
|
Select Menu Maintenance
by moving the pointer to the second option
on the TK-GUARDIAN Security Management menu, and pressing [RETURN]. |
This is the TK-GUARDIAN Menu Editor. It provides a variety of approaches to constructing a menu system that is as simple or as complex as your application (or applications) demand. As you compare the example shown above to your screen, you will quickly notice that for the purpose of this introduction, we have added several options in addition to Security Maintenance. To understand how the Menu Editor works, it is helpful to gain some insight into the menu structure which underlies the system. The first thing to learn is that TK-GUARDIAN makes use of a tree structured design. In other words, there is one master menu from which all menus can be accessed. Tree Structured Menu System (O] FONT 10800; MRP 2.5,0; BOX 1,.6; MRP .27,.24; TEXT "Master"; MRP .05,.2; TEXT "Menu"; MRP .18,.16; DRP 0,.2; DRP 2,0; MRP -2,0; DRP-2,0; DRP 0,.2; MRP -.5,0; BOX 1,.6; MRP .35,.24; TEXT "User"; MRP -.23,.2; TEXT "Application"; MRP 2.38,-.64; DRP 0,.2; MRP -.5,0; BOX 1,.6; MRP .25,.24; TEXT "Level 2"; MRP .08,.2; TEXT "Menu"; MRP .17,.16; DRP 0,.2; MRP 2.02,-1; DRP 0,.2; MRP -.5,0; BOX 1,.6; MRP .25,.24; TEXT "Level 2"; MRP .08,.2; TEXT "Menu"; MRP .17,.16; DRP 0,.2; DRP 1,0; DRP -2,0; DRP 0,.2; MRP -.5,0; BOX 1,.6; MRP .35,.24; TEXT "User"; MRP -.23,.2; TEXT "Application"; MRP 2.39,-.64; DRP 0,.2; MRP -.5,0; BOX 1,.6; MRP .25,.24; TEXT "Level 3"; MRP .08,.2; TEXT "Menu"; MRP .17,.16; DRP 0,.2; FONT 1; EXIT; Notice in the illustration shown above, that all applications and sub-menus are accessed through the master menu. Also, note that applications can be invoked at every level, including the master menu. Although it is unlikely that there will ever be a need to test it, there is a theoretical limit of over two hundred levels which the tree structure will support. Since each menu can have as many as forty eight selections in it, most menu systems will never go past four or five levels.
Special Keys |
The Menu Editor makes use of many of the function keys used by TK-WRITER
and other TK packages. The keys available are indicated at the bottom of
the screen. However, TK-GUARDIAN is run in a wide variety of hardware
environments. As a result the keys assigned to each of these special
functions may not be readily known. | To remedy this situation, we have added a pop-up window which tells which keys on your terminal perform the various functions. Press a ? to see this list, and press [RETURN] when ready to resume editing.
Mnemonic |
In the illustration of the Menu Editor screen, notice the column labeled
'MN', which is a very short abbreviation for MNEMONIC. In the Menu
Driver, options can be identified by typing one or more characters of a
mnemonic. | Each option on a menu may have a mnemonic which can be up to three characters in length and can be composed of only upper case alphabetic characters and numerals. Care must be taken when assigning mnemonics to avoid having two or more options in the same menu with the same one. This of course will make identification of a selection by mnemonic difficult.
Description |
The Description field is where the name of the option which will appear on
the final menu is entered. It can be composed of any characters. | However, TK-GUARDIAN supports up to three columns of options on each menu. In some cases, the Menu Editor is forced to truncate the description to make it fit on the screen. The best way to determine maximum lengths for your options is through experimentation.
Password |
Each option in a TK-GUARDIAN menu may be assigned a password. Passwords
may be the repeated as often as desired. When entering a password, the
Menu Editor will convert any lower case alphabetic characters to upper
case. |
Toolkit |
To facilitate system efficiency, indicate with a Y
any applications
which are based on PG&A's Toolkit Architecture, such as TK-WRITER,
TK-FORM, etc. The Menu Driver will then leave key environmental
characteristics, such as the TK array, available for the next program to
be executed. |
Command |
The command column enables a variety of execution alternatives. Currently,
TK-GUARDIAN supports six, which are:
|
Routine |
Enter here the name of the MUMPS routine, global or variable which is to
be acted on with the command defined in the Command field. | By using horizontal scrolling, the Menu Editor provides more space in this field than is available on the screen. As a result, you can enter more than the 18 characters which the screen is able to display at one time. Two supplemental routines, called CLR and PAU , which are internal to the Menu Driver are available for use before and after branching to your applications. CLR positions the cursor at row 1 column 1 of the screen and erases its contents. PAU forces a "Press any key to continue..." message prior to re-entering TK-GUARDIAN menus. It is important to note, however, that these subroutines can be used only with the DO and XECUTE commands. Examples of its use are provided below:
Menu Timeout |
Each menu is automatically assigned a default timeout of 300 seconds (5
minutes) when created. This can easily be changed by moving to the
Timeout
field on the screen using the cursor [UP] key when at the
top row of the menu. Enter a number from 10 to 28,800 (8 hours). |
Title |
Menu titles are also assigned a default when first accessed. The default
is the title of the option in the previous menu which points to it. | Each title can be changed by moving to the Title field on the screen using the cursor [UP] key when in the Timeout field.
Next Column |
TK-GUARDIAN provides as many as three columns of options for each menu.
However, the Editor can only display one at a time. The current column is
displayed at the end of the third line from the top of the screen. | To move from one column to the next, press the [TAB] key. When the third column is on the screen, pressing the [TAB] key will return you to the first column.
Next Level |
If you create an option which branches to a lower level menu, and have
identified the command as M
, then you can use the PGDN function key
to access the next menu in the Editor. Remember that the cursor must be
on the row of the option with the M
command when the PGDN key is
pressed. | Likewise, to move back from a sub-menu, use the PGUP key. Unlike using the PGDN key, the cursor does not have to be in any particular position for it to work.
Moving Options |
The Menu Editor is essentially a what-you-see-iswhat-you-get (WYSIWYG)
oriented editor, particularly with regard to vertical position. Each
option on a menu will appear exactly where it was placed in the Menu
Editor. | Occasionally, there is a need to move selections around on a menu. This can be easily accomplished using the COP/MOV function key. To do so, position the cursor on the line of the option to be moved and press the COP/MOV function key. Now use the [TAB], cursor [UP] and cursor [DOWN] keys to move the option to the desired location on the menu. When satisfied, simply press [RETURN]. Because of the interaction between the menu system and the security system, it is not recommended that a selection be deleted and then re-added at some other location. All security clearances would have to be re-established for the new item. Using the COP/MOV function is quicker, and relieves you of the headache of revising system security.
CLASSIFICATION MAINTENANCE |
Select Classification Maintenance from the menu by moving the pointer
to the third option on the TK-GUARDIAN Security Management menu, and
pressing [RETURN]. | A sub-menu will be displayed. Select the option titled Add/Edit Classification.
Lookup |
When the Classification Maintenance screen is first displayed, you will
have an opportunity to choose the classification which is to be edited.
As with other similar lookup screens in the system, there are several
approaches to use. | If you press a * the current list of classifications will be displayed. You can select one of them by moving the pointer to the desired classification and pressing [RETURN]. Should the classification you're looking for not be in the list, press the EXIT key and you will be given the opportunity to search again. If you enter several characters, such as AL , and press [RETURN], TK-GUARDIAN will display only those classifications which start with the letters 'AL' and you can choose one of them as described above. However, if no classifications exist which begin with the letters 'AL', you will be asked if you would like to add this one. Answer with a Y if you want to add the classification you've searched for.
Default Classification |
TK-GUARDIAN has a default classification which can be assigned to both
users and devices called ALL
. This classification is different from
all others because it does not need to be changed when new options and/or
menus are added to the system. | The default classification was assigned to the system manager when TK-GUARDIAN was initialized.
Add a Classification |
Add a classification called DEM and give it the description DEMONSTRATION
CLASS. | After the screen changes, you will first be given an opportunity to change the classification description. Press [RETURN] to leave it as it is, or when finished making your changes. The screen which is displayed should appear very similar to the following example.
Although it is very easy to modify security for a classification, you'll notice that very little assistance is provided on the screen. This in a small way is to prevent unwanted tampering with the definition of security classifications. While the cursor is on the only option, type a Y . This will enable this option for users and devices assigned to this security classification. Since the cursor was on the last (and only) option of the menu when Y was pressed the maintenance program has proceeded to the next menu. A menu, much like the one shown below, should be displayed.
Beginning with the first (or master) menu, each of the available menus in the menu system will be displayed on the screen as in the example. Those menu options which have been made available for this classification are indicated by an asterisk * to the left of the option. For each menu, there are several possible actions.
USER MAINTENANCE
|
Select User Maintenance from the menu by moving the pointer to the fourth
option on the TK-GUARDIAN Security Management menu, and pressing [RETURN].
| A sub-menu will be displayed with three User Maintenance options. Select the first Add/Edit User.
Add/Edit User |
This screen, as you will see, provides the means for adding new users, as
well as maintaining user information. | It first prompts for user name. This lookup field works the same as the Classification Lookup. Press * to see a list of the currently defined users. Notice that your name (or that of the System Manager) has already been added by the Initialization program. Select this name by again pressing [RETURN]. The full user screen will be displayed. A sample of this screen is provided here.
Notice that the cursor remains in the NAME field to enable edit of the user's name. Using [RETURN] or the cursor [DOWN] and cursor [UP] keys, the cursor can be moved to desired fields. If additional user fields have been defined in the User Information screen, they have been added to the bottom of the screen. Several fields on this screen have key importance to the management of system security. They are as follows:
Status |
The status field provides the ability to deactivate any user. When
deactivated, the user's password will not allow entry to the system
beginning at the next logon. Possible responses for this field
are [A] for Active and [I] for Inactive. |
Password |
If the User Security option has been selected in the Basic Parameters
screen, users will be required to logon to the system by entering their
password. In a single-stage logon, this password identifies the user and
the user's security clearance to the system. | In a two-stage logon, the password verifies the identity of the user who has already identified himself or herself.
Direct Mode Access
|
Available responses are Y for Yes and N
for No. When Direct
Mode is enabled, [BREAK] and [CTRL- C] keys can be used to interrupt menus
(and potentially applications) and access will be provided to MUMPS when
exiting TK-GUARDIAN's Master Menu. Otherwise, TK-GUARDIAN will halt. |
NOTE: Some MUMPS environments allow a job's status to be changed from "tied" to "free" during a session, thus enabling Direct Mode. Others do not. If you encounter problems with this feature, please call us. We will gladly provide more specific information. Department |
This field is used primarily when TK-MAIL is installed along with
TK-GUARDIAN. It permits selection, by department, of the persons to whom
mail is to be sent. |
Security Classification |
This field identifies the security classification assigned to the user.
There are three possible approaches to this field. |
Change User Security |
Although TK-GUARDIAN provides a comprehensive security classification
function, it assumes that not all users will fit into classification
categories. Hence the ability to define user-specific security. | Select the Change User Security screen from the User Maintenance menu. You will first be prompted for the user name. Enter several characters of the user's last name (or * for a list of all users) and press [RETURN]. Select the desired user by moving the pointer up or down to it and pressing [RETURN]. From this point on, this program operates just like the Classification Security maintenance program. Refer to the explanation there for further assistance.
NOTE: When a user has been given security through this program, it will not take effect until the Security Classification field in the Add/Edit User Screen is blank.
Delete User |
Because TK-GUARDIAN enables a user's status to be made inactive, it is not
necessary, nor wise to remove the user from the system entirely. However,
from time to time it is necessary to remove duplicates or test data from
the files. This program performs that function. | Select the Delete User screen from the User Maintenance menu. You will first be prompted for the user name. Enter several characters of the user's last name (or * for a list of all users) and press [RETURN]. Select the user to be removed from the system by moving the pointer up or down to it and pressing [RETURN].
As you can see in the example above, the user's data is displayed to assist in confirming that the correct user has been selected. If this is not the intended user, press N or the EXIT key to search again. Otherwise, press Y. The user will quickly be removed.
DEVICE MAINTENANCE
|
Select Device Maintenance from the Security Management menu. |
Add/Edit Device |
Select the Add/Edit Device Information screen from the Device Maintenance
menu. This screen provides the ability to define device locations to the
system for security purposes. Device level security is only active when
it has been selected on the Basic Parameters screen. |
NOTE: Some networks, such as Ethernet, do not provide static device numbers for each terminal device. In these environments, a device named DEFAULT must be created to control security. Most of the parameters of this screen can be applied to all terminals in a networked environment by defining a device called "DEFAULT". At the time of logon, TK-GUARDIAN first checks to see if the current device has been defined. If not, it then checks to see if a device called "DEFAULT" has been defined. If neither are available, and device security has been enabled by the Basic Parameters screen, logon is denied.
Lookup |
When the screen is displayed, you are given the opportunity to select the
device number to be defined or edited. The lookup works like other
similar lookups in the system. Press *
to get a complete list of
currently defined devices from which to choose. | When TK-GUARDIAN was initialized, the device from which it was initialized was defined temporarily for you. The screen should be very similar to the sample shown above. After selection of a device, and editing of the device location, you are given the opportunity to define device specific parameters. The key fields available are described below.
Device Status |
Like users, specific devices can be inactivated without removing them from
the system. Possible responses are A for Active and I
for
Inactive. Chaging of this field has no effect if device security is not
selected in the Basic Parameters screen. |
Security Status |
In many systems, especially when development and operations are performed
on the same system, it is appropriate for Device Security to be on, but
ignored for certain (e.g., development) terminals. | Possible responses are S for Secured, and U for Unsecured. When a device is unsecured, logon is no longer required, access is granted to all menus and menu options, and direct mode is enabled.
Security Classifications |
Enter the name of the security classification to be assigned to this
device. Security classifications must have been defined by the
Classification Maintenance screen. You may also use the system
classification ALL
which provides access to all system menus and
options. | If you leave the security classification field empty, the system assumes that you either have, or will define device-specific security for this device. Refer to Change Device Security for more information.
Direct Mode Enabled
|
Similar to direct mode for users, this field makes direct mode available
to anyone who logs on at this device. | Note however that user parameters always override device parameters in this system. As a result, if Direct Mode is not enabled, a user who has been provided Direct Mode Access will be able to enter direct mode. In addition, a user for whom Direct Mode has been denied, logging in to a device in which Direct Mode has been disabled, will not have access to direct mode once they have logged in.
NOTE: Some MUMPS environments allow a job's status to be changed from "tied" to "free" during a session, thus enabling Direct Mode. Others do not. If you encounter problems with this feature, please call us. We will gladly provide more specific information.
Keep Activity Log
|
From time to time it is desirable to monitor user activity in the system.
This field enables this logging feature. Answer [Y] for yes or [N] for
no. |
Keep Activity for
|
Often when logging activity, it is desirable to purge the activity data
after a specified period of time. If you want activity data to be purged,
enter a number from 1 to 999. Leaving the field blank when Logging has
been selected will disable purging. | Note that purging for each device is performed when a logon to that device is attempted.
Change Device Security |
Although TK-GUARDIAN provides a comprehensive security classification
function, it assumes that not all devices will fit into classification
categories. Hence the ability to define device-specific security. | Select the Change Device Security screen from the Device Maintenance menu. You will first be prompted for the device. Enter the device number (or * for a list of all devices) and press [RETURN]. Select the desired device by moving the pointer up or down to it and pressing [RETURN]. From this point on, this program operates just like the Classification Security maintenance program. Refer to the explanation there for further assistance.
NOTE: When a device has been given security through this program, it will not take effect until the Security Classification field in the Add/Edit Device screen is blank.
Delete Device |
From time to time, as the configuration of your system changes, it is
necessary to remove a device from the device table. In some cases this is
done to enable the use of the DEFAULT device parameters at a desired
location. This program performs that function. | Select the Delete Device screen from the Device Maintenance menu. You will first be prompted for the device number. Enter the number of the desired device ($I or * for a list of all devices) and press [RETURN]. Select the device to be removed from the system by moving the pointer up or down to it and pressing [RETURN].
| |||||||||||||||||||||||||||||||||||||||||||||||||||||