IBM System/34 - System Security

System Security

There are three types of System/34 security: the badge reader that almost nobody ever bought, so it isn't discussed here; password security; and resource security.

Password security was used to begin a session at a computer terminal. Unless security was inactive, a correct password must be entered to begin.

The System/34 sign on looked like this:

  • SIGN ON W1
  • USER ID......... ________
  • PASSWORD........ ____
  • MENU (OPTIONAL). ______
  • LIBRARY......... ________


The PROF ("Profile") procedure was used to work with User IDs and passwords. The user profile contains a 1-to-8 character alphanumeric User ID, a 4 character alphanumeric password, a code for the user's security rating—M (Master Security Officer), S (Security Officer), O (System Operator), C (Subconsole Operator), or D (Display Station Operator) -- and a number of other default settings.

The PRSRCID ("Profile Resource Security By User ID") procedure was used to establish security ratings for file and library objects. Access levels of O (Owner), G (Change), R (Read), E (Execute) or N (None) could be granted for a user to a particular resource.

The printed disk catalog (VTOC, Volume Table of Contents) displayed all secured objects with the notation 3 as being secured.

Read more about this topic:  IBM System/34

Famous quotes containing the words system and/or security:

    The genius of any slave system is found in the dynamics which isolate slaves from each other, obscure the reality of a common condition, and make united rebellion against the oppressor inconceivable.
    Andrea Dworkin (b. 1946)

    I feel a sincere wish indeed to see our government brought back to it’s republican principles, to see that kind of government firmly fixed, to which my whole life has been devoted. I hope we shall now see it so established, as that when I retire, it may be under full security that we are to continue free and happy.
    Thomas Jefferson (1743–1826)