Home Page M | FileMan | Kernel | CS/MM/Web | Programmer Tools | Applications



Kernel's Sign-On/System Security tools provide the means for signing into your computing system with a unique identity. When you sign on to the VISTA computer system, you are required to enter an access code and a verify code. These codes identify you to the computer system and serve to prevent unauthorized access to your account. Once you have completed the sign-on process, Kernel provides you with menus where you can run any application the system manager has made available to you.

User Management Tools

Kernel provides many system management tools to provide a secure multi-user M based computing system. These tools organize users and allow secure log-ons. User management tools include:

* Add new users - create a new user account.

*Grant access by profile - grant menu access to one or more users based on a user profile.

*Edit an existing user - edit the attributes of an existing user.

*Deactivate a user - disable the ability of a user to access your system.

*Reactivate a user - re-enable access for a user who has been terminated.

*User Inquiry - display information about users on your system.

Kernel also provides a set of options to help monitor and support users logged on to your system. Many audits may be printed to ensure security to your system. These include:

*Find a User - find a user that is currently signed onto your system.

* List User - lists all users know to your system.

*User Inquiry - displays various attributes of a specified user.

*User Status Report - displays users currently signed on to your system.

* Sign-On audits - displays sign on activity.

*Failed Access Attempt Audit - reports entries of invalid access/verify code pairs.

Electronic Signatures

An electronic signature is a security tool that application packages can use as an additional identification check. This tool adds further sequrity to your systeem by providing the capability of requiring an electronic signature to a form or document before subsequent processing can continue.

File Access Security

Kernel also provides File Access Security tools that control user access to VA FileMan files. The purpose of granting file access is to control the use of VA FileMan to change file entries or to alter the overall structure of files. There are six levels of access: read, write, delete, laygo, dd, and audit. Granting all of the first four levels of access will permit adding and deleting file entries as well as editing their attribute field data values. The last two kinds of access pertain to the structure of the file itself.

The system manager is responsible for granting file access. The needs of each user must be determined and an appropriate access authority code assigned. Kernel's File Access Security tools provide an added security measure to protect modifications and viewing of your FileMan databases. With file access security, it is possible to know who has access to which files and what kind of access they have.

Programming API's

Programmers can take advantage of Kernel's Sign On/Security tools by referencing callable entry points to function and utilities within their application code. Kernel also provides programmers direct mode tools to simulate ordinary user sign-on to test code and diagnose errors. These tools are not callable entry points and cannot be used in application routines. They are used solely for debugging purposes.

Overview | Intro | Sign-On/Security | Menu Management |
Device Management | Task Management | KIDS | Repairs |

Search | Home | MUMPS | Fileman | Kernel | C/S, Mailman, Web | Programmer Tools | Applications