bestbarcoder.com

Allocating Devices in .NET Printing ECC200 in .NET Allocating Devices

Allocating Devices use .net data matrix ecc200 integrating toaccess datamatrix on .net QR Code ISO speicification The Solaris 9 Operatin 2d Data Matrix barcode for .NET g Environment provides a device allocation method that fulfills the Trusted Computer System Evaluation Criteria (TCSEC) object-reuse requirement for computing systems at level C2 and above. The device allocation mechanism prevents simultaneous access to a device, prevents one user from reading media being written to the device by another user, and prevents one user from accessing any information from the device or driver internal storage after another user is finished with the device.

For example, several users often share a single tape drive that may not be located at an individual user"s location. If the tape drive is located remotely, some time can elapse between the time the user loads a tape in the drive and the time the user invokes a command to access the tape in the drive. Because other users could access the drive while the tape is unattended, another user could access or overwrite the data on the tape.

With the device allocation mechanism, you can ensure that one user at a time has access to a specific tape device. Use the commands described in Table 56 to manage device allocation..

Table 56. Device Allocation Commands Command allocate(1) Al ECC200 for .NET locate ownership of devices. deallocate(1) Deallocate ownership of devices.

dminfo(1M) Report information about a device entry in a device maps file. list_devices(1) List the allocatable devices in the system according to specified qualifications. Description.

NOTE. The device alloc ation commands are available only if the Basic Security Module (BSM) has been enabled..

Enabling BSM The basic security mod ule (BSM) is the Sun Microsystem implementation of C2 security. It provides an auditing capability with self-contained audit records that contain all the relevant information about an event. For example, an audit record describing a file event contains the absolute path name and a time stamp and date stamp of the opening or closing of the file.

Use the bsmconv command as root to enable BSM.. NOTE. The bsmconv comm datamatrix 2d barcode for .NET and adds a line to /etc/system that disables the ability to abort the system with the Stop-A keyboard sequence.

If you want to retain that ability, you must comment out the following line in the /etc/system file after you run the bsmconv command.. set abort_enable = 0 Use the following procedure to enable BSM. 1. Become superuser. 2 .

Type telinit 1 and press Return to bring the system to single-user mode. 3. Type /etc/security/bsmconv and press Return to begin the process of enabling BSM.

4. Type y and press Return to enable BSM. 5.

Type telinit 6 and press Return to reboot the system as a multiuser BSM system. The following example uses the bsmconv command to enable the basic security model and uses the telinit 6 command to reboot the system..

# /etc/security/bsmcon Data Matrix ECC200 for .NET v This script is used to enable the Basic Security Module (BSM). Shall we continue with the conversion now [y/n] y bsmconv: INFO: checking startup file.

bsmconv: INFO: move aside /etc/rc2.d/S92volmgt. bsmconv: INFO: turning on audit module.

. bsmconv: INFO: initial izing device allocation files. The Basic Security Module is ready. If there were any errors, please fix them now.

Configure BSM by editing files located in /etc/security. Reboot this system now to come up with BSM enabled. # telinit 6.

Disabling BSM If you no longer requi re BSM, you can disable it with the bsmconv command. Use the following steps to disable BSM and remove the BSM entry from the /etc/system file..

1. Become superuser. 2 .

net vs 2010 Data Matrix 2d barcode . Type telinit 1 and press Return to bring the system to single-user mode. 3.

Type /etc/security/bsmunconv and press Return to begin the process of disabling BSM. 4. Type y and press Return to disable BSM.

5. Type telinit 6 and press Return to reboot the system without BSM. The following example uses the bsmunconv command to disable the basic security model.

. # /etc/security/bsmunc onv This script is used to disable the Basic Security Module (BSM). Shall we continue the reversion to a non-BSM system now [y/n] y bsmunconv: INFO: moving aside /etc/security/audit_startup. bsmunconv: INFO: restore /etc/rc2.

d/S92volmgt. bsmunconv: INFO: removing c2audit:audit_load from /etc/system. The Basic Security Module has been disabled.

Reboot this system now to come up without BSM. # telinit 6.
Copyright © bestbarcoder.com . All rights reserved.