It is important to note that a UIC does not necessarily identify one particular user. It is possible for the system manager to assign the same UIC to two or more user accounts. It is also possible to reuse a UIC previously assigned to a
Because UICs are closely
Of course, a system manager may find valid reasons for violating either of these guidelines on a case-by-case basis.
is a credential held by one or more users. Identifiers are usually used to
All users in a company's accounting department might belong to the same UIC
Identifiers are used in conjunction with ACLs to grant this type of special access to files. ACLs are described in Chapter 7, "The
Thus, UIC-based protection adequately handles most situations, but the PAYROLL identifier provides special access to specific individuals.
In addition, OpenVMS usually creates a separate identifier for every UIC. Some system managers choose to prevent this, and doing so does not interfere with users' ability to access files. The only real difference most users will notice is whether or not file ownership is shown by UIC or by identifier.
For example say user MIKE has a UIC of [1,100], but the system manager has prevented the identifier MIKE from being created. Ownership for MIKE's files will be listed as
$ DIRECTORY /OWNER LOGIN.COM Directory DKA100:[MIKE] LOGIN.COM;51 [1,100] Total of 1 file.
If, however, the identifier MIKE was created to go along with his UIC, file ownership for his files will be displayed in the following format:
$ DIRECTORY /OWNER LOGIN.COM Directory DKA100:[MIKE] LOGIN.COM;51 [MIKE] Total of 1 file.
Your user account defines nearly every aspect of your identity on the system: your username, the location for your files, your rights and privileges, your limits on resource consumption, and more. You need not understand all aspects of it in great detail, as your system manager will assign the appropriate settings. However, your interactions with the system will be more intuitive if you have a general understanding of your
This section takes the reader through the steps necessary to establish a connection and log into an OpenVMS system. Once you are logged in, you are ready to try the examples in Chapter 6, "The Digital Command Language." If you have access to an OpenVMS system, you may log in now; however, you may find it helpful to read Chapter 6, "The Digital Command Language" first.
For the purposes of this section, it is assumed that you will be using a terminal or terminal window to access the system. If you are using an OpenVMS workstation equipped with a GUI interface,