IBM System/34 - System Security

System Security

There are three types of System/34 security: the badge reader that almost nobody ever bought, so it isn't discussed here; password security; and resource security.

Password security was used to begin a session at a computer terminal. Unless security was inactive, a correct password must be entered to begin.

The System/34 sign on looked like this:

  • SIGN ON W1
  • USER ID......... ________
  • PASSWORD........ ____
  • MENU (OPTIONAL). ______
  • LIBRARY......... ________


The PROF ("Profile") procedure was used to work with User IDs and passwords. The user profile contains a 1-to-8 character alphanumeric User ID, a 4 character alphanumeric password, a code for the user's security rating—M (Master Security Officer), S (Security Officer), O (System Operator), C (Subconsole Operator), or D (Display Station Operator) -- and a number of other default settings.

The PRSRCID ("Profile Resource Security By User ID") procedure was used to establish security ratings for file and library objects. Access levels of O (Owner), G (Change), R (Read), E (Execute) or N (None) could be granted for a user to a particular resource.

The printed disk catalog (VTOC, Volume Table of Contents) displayed all secured objects with the notation 3 as being secured.

Read more about this topic:  IBM System/34

Famous quotes containing the words system and/or security:

    Predatory capitalism created a complex industrial system and an advanced technology; it permitted a considerable extension of democratic practice and fostered certain liberal values, but within limits that are now being pressed and must be overcome. It is not a fit system for the mid- twentieth century.
    Noam Chomsky (b. 1928)

    When kindness has left people, even for a few moments, we become afraid of them as if their reason had left them. When it has left a place where we have always found it, it is like shipwreck; we drop from security into something malevolent and bottomless.
    Willa Cather (1876–1947)