System Security
There are three types of System/34 security: the badge reader that almost nobody ever bought, so it isn't discussed here; password security; and resource security.
Password security was used to begin a session at a computer terminal. Unless security was inactive, a correct password must be entered to begin.
The System/34 sign on looked like this:
- SIGN ON W1
- USER ID......... ________
- PASSWORD........ ____
- MENU (OPTIONAL). ______
- LIBRARY......... ________
The PROF ("Profile") procedure was used to work with User IDs and passwords. The user profile contains a 1-to-8 character alphanumeric User ID, a 4 character alphanumeric password, a code for the user's security rating—M (Master Security Officer), S (Security Officer), O (System Operator), C (Subconsole Operator), or D (Display Station Operator) -- and a number of other default settings.
The PRSRCID ("Profile Resource Security By User ID") procedure was used to establish security ratings for file and library objects. Access levels of O (Owner), G (Change), R (Read), E (Execute) or N (None) could be granted for a user to a particular resource.
The printed disk catalog (VTOC, Volume Table of Contents) displayed all secured objects with the notation 3 as being secured.
Read more about this topic: IBM System/34
Famous quotes containing the words system and/or security:
“The system was breaking down. The one who had wandered alone past so many happenings and events began to feel, backing up along the primal vein that led to his center, the beginning of hiccup that would, if left to gather, explode the center to the extremities of life, the suburbs through which one makes ones way to where the country is.”
—John Ashbery (b. 1927)
“The reins of government have been so long slackened, that I fear the people will not quietly submit to those restraints which are necessary for the peace and security of the community.”
—Abigail Adams (17441818)