home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!gatech!paladin.american.edu!darwin.sura.net!spool.mu.edu!uwm.edu!psuvax1!rutgers!spcvxb!terry
- From: terry@spcvxb.spc.edu (Terry Kennedy, Operations Mgr.)
- Newsgroups: comp.os.vms
- Subject: Re: Getting rid of SMB_SECURITY once and for all ?
- Message-ID: <1992Dec23.133647.4755@spcvxb.spc.edu>
- Date: 23 Dec 92 18:36:47 GMT
- References: <1h8f4bINNehh@manuel.anu.edu.au>
- Organization: St. Peter's College, US
- Lines: 16
-
- In article <1h8f4bINNehh@manuel.anu.edu.au>, bear@nuc.anu.edu.au (Bernhard Fabricius) writes:
- > (basically because there are too many users who re-direct DECW$USER_DEFAULTS
- > from SYS$LOGIN, so it would take too long!), I was wondering if there is a way
- > to tell the server not to check "Security" at all, ie let all connections in,
- > or possible have a list of "secure hosts" (like the nodes in our cluster, for
- > crying out loud!) which can always get in regardless of the contents of the
- > user's SMB_SECURITY file ?
-
- I think you want SYS$MANAGER:DECW$SERVER_ACCESS_ALLOWED.DAT. You list the
- usual security triples in there (like * * *). Of course, note that this means
- that I could put up a fake login box on your workstation from the comfort of
- my own home 8-), so you might want to restrict it to specified hosts/users.
-
- Terry Kennedy Operations Manager, Academic Computing
- terry@spcvxa.bitnet St. Peter's College, Jersey City, NJ USA
- terry@spcvxa.spc.edu +1 201 915 9381
-