The information contained in this guide is subject to change without notice.
Fitzgerald & Long, Inc. shall not be liable for technical or editorial omissions made herein; nor for
incidental or consequential damages resulting from the furnishing, performance, or use of this material.
This guide contains information protected by copyright. No part of this guide may be photocopied or
reproduced in any form without prior written consent from Fitzgerald & Long, Inc.
Copyright 2000 by
Fitzgerald & Long, Inc.
12341 E. Cornell Avenue, #18
Aurora, Colorado 80014-3323
(303) 755-1102
All rights are reserved.
The software described in this document is furnished under a license agreement. The software may be used
or copied only in accordance with the terms of the agreement. The software and this documentation are
entirely the property of Fitzgerald & Long, Inc. It is against the law to copy the software onto tape, disk,
diskette, or any other medium for any purpose other than for back-up or archival purposes.
UNIX is a registered trademark of Unix System Laboratories. uniVerse, PI/open, and UniData are
registered trademarks of Informix Software, Inc.
Table Of Contents
USING THIS GUIDE---------------------------------------------------------------------------------------- Intro - 1
USING THE SCREENS ------------------------------------------------------------------------------------ Intro - 3
INSTALLING SENTRY------------------------------------------------------------------------------------ Intro - 5
GETTING STARTED--------------------------------------------------------------------------------------- Intro - 8
INTRODUCING THE MAIN MENU ------------------------------------------------------------------Intro - 12
1. INTRODUCING THE DATABASE CREATION AND VALIDATION MENU----------- 1 - 1
1.0 DATABASE CREATION AND VALUDATION MENU------------------------------------------- 1 - 2
1.1 UPLOAD USER AND GROUP PROFILES FROM UNIX----------------------------------------- 1 - 4
1.2 CREATE DATABASE FROM FILE SYSTEM ------------------------------------------------------ 1 - 6
1.3 VALIDATE THE USER PROFILE DATABASE ---------------------------------------------------- 1 - 7
2. INTRODUCING THE DATABASE MAINTENANCE MENU-------------------------------- 2 - 1
The SENTRY User's Guide is comprehensive in its descriptions of all of SENTRY's menus, data entry
screens and reports. The Guide follows the same structure as the SENTRY menu system.
There are four major sections in SENTRY. These are:
1. Database Creation and Validation
2. Database Maintenance
3. Reports
4. Utilities
Additionally, there is an introductory section and a number of appendices. The introduction includes an
overview of the User’s Guide, a description of conventions used throughout the SENTRY screens,
installation instructions and suggestions on getting started.
Note that each menu selection has a number to its left indicating the selection number from the Main Menu.
For example, the Database Maintenance Menu is preceded by the number "2", indicating that it is
the second selection from the Main Menu. The User Maintenance program documentation has the
section number 2.2 in it's title. This references the second program, User Maintenance, in the second
section, Database Maintenance.
The Guide uses several notation conventions for the sake of easy reading and conciseness. These include:
<RETURN> This figure indicates that the return key, sometimes called NEW LINE or ENTER, should
be pressed. This is one key stroke.
<ESC> This figure is used to indicate the escape key. Most keyboards have a key labeled "ESC".
The use of the escape key is ALWAYS followed by <RETURN>. SENTRY uses this key
to allow an abort or escape from any program. All data remains as it were prior to the
aborted session. Please note that this function may be assigned to another key if desired.
See Appendix 2 for details on creating new key bindings.
" " (quotes) The SENTRY User's Guide frequently uses double quotation marks to set off the
characters you should enter. NEVER type the quotes!
TCLTerminal Control Language. SENTRY will function equally well on any of the UNIX-
based database environments, including uniVerse, UniData and PI/open. Since each
environment uses its own naming conventions we have used the generic term “TCL” to
indicate the command prompt for whichever environment you are using. For UniData and
Fitzgerald & Long
Introduction - 2 SENTRY User’s Guide
PI/open the command prompt is indicated by a colon “:” while for uniVerse the prompt is
a greater-than sign “>”.
Fitzgerald & Long
SENTRY User’s Guide Introduction - 3
USING THE SCREENS
SENTRY data entry screens feature some very helpful functions. These include "repaint", "backup",
"escape" (exit without update), “execute” and "help". The following paragraphs describe each function.
Repaint ^^ <RETURN> Enter a caret twice, followed by <RETURN>. The caret key is generally
located on the same key as the "6" (SHIFT 6). This is a total of three key strokes. The
screen will be repainted and the cursor will be repositioned to its original position. This is
very convenient when a system message causes a data entry screen to scroll.
Backup ^ <RETURN> Press the caret key followed by return (2 key strokes). This will cause the
cursor to backup one prompt in the data entry screen.
Escape <ESC> <RETURN> Press the escape key followed by the return key (2 key strokes).
This feature allows you to exit any data entry program at any prompt. No data will be
changed.
Use this key to exit data entry screens when you have made changes and wish to cancel
your changes. To save changes you must enter "F" to file those changes.
XEQ You may use TCL (Terminal Control Language) commands at any input prompt. Enter
"XEQ" followed by your command. For example:
XEQ LIST SENTRY.USERS WITH <
DEPARTMENT = “MIS” USER.NAME
HELP Enter the word HELP at any input prompt in SENTRY. A HELP screen will be displayed
containing a brief explanation of the expected input and syntax where appropriate. Press
<RETURN> to exit the HELP screen.
Please note that these functions may be assigned to alternate keys if desired. See Appendix 2 for details
regarding creation of new key bindings
Fitzgerald & Long
Introduction - 4 SENTRY User’s Guide
Data Entry Conventions
Underscore/underline When awaiting data, the cursor is positioned at the beginning of the field.
The field is delineated by underscores. A sentence describing the field is
displayed at the bottom of the screen. No data appearing on the
underscore is an indication that the field in the database is currently null.
Field numbers Each data entry screen and menu uses sequential numbers which appear at
the left of the field descriptions. To address a particular field, enter the
number associated with that field.
Change a field Having addressed the desired field via the field number, an underscore will
appear to the right of the current data and the cursor will be positioned on
the leftmost character of the data field. Type over the existing data to
change it. DO NOT space over existing data to delete characters which
your new entry does not cover. Simply <RETURN> when you have
entered the new data. The field will be repainted to display your entry.
Deleting a field When you wish to delete the data in a field and make the field null,
address the field using the appropriate line number, then enter a space
followed by <RETURN>. A blank (null) field will be displayed.
Fitzgerald & Long
SENTRY User’s Guide Introduction - 5
INSTALLING SENTRY
Installing the SENTRY software is very simple! Just follow these easy steps. If you encounter problems at
any point, please call us for additional assistance.
Before you begin, check your system to see if there is a possible conflict with the accounts we will be
loading. Do you have an account or user name called "sentry" or "sentry.practice"? If you have an account
or user ID which uses either of these names, DO NOT INSTALL SENTRY. Please call us for alternate
installation instructions. If you are in doubt as to the naming conventions on your computer, DO NOT
INSTALL SENTRY. Be safe, call us for assistance and instruction on installation. We want to help.
SENTRY will require approximately 5 to 10 MB of disk space in one filesystem on your computer. This is
an estimate. The actual size will vary depending on the number of files on your system and the cross
referencing for those files. Please discuss your disk space concerns with us. Check to see that this space is
available before beginning installation. You will NOT need to stop or start the system during installation
and your users may continue to use the computer while you are installing SENTRY.
1. Login to your system as the super-user (usually the user "root"). Change directories ("cd") to the
directory where you wish to place the SENTRY account. We suggest placing SENTRY in a top-level
directory (for example, the "/u1" or “/usr” directory). SENTRY may be placed on any local file system.
2. List the contents of the directory using "ls" or "ls -C". Make sure that this is the directory where you
wish to place SENTRY. Use "pwd" to verify your directory.
3. If SENTRY has been previously installed on your system, there may be an existing directory named
"sentry". Change the name of this existing directory to "sentry.old" by entering the command:
mv sentry sentry.old
Enter "ls -C" to verify that the name is changed.
4. Restore the contents of the tape using cpio. You will need to know the device file used to interface with
your tape drive. Ours, for example, is "/dev/rmt/0m". Enter this command:
cpio -icvBdum < /dev/xxx (replace xxx with your device file name)
The tape contains two accounts: sentry and sentry.practice. You must restore sentry; sentry.practice is
optional. It contains several demonstration items and files.
5. When the restore is complete, cd to the sentry directory and list the contents ("ls" or "ls -C").
Fitzgerald & Long
Introduction - 6 SENTRY User’s Guide
6. Notice a file named "install". This is a script which will perform the steps necessary to install the
SENTRY software. Execute the script by entering:
./install
7. Next type the command to enter your database environment (uv, udt, piopen). You should now see the
TCL prompt ">" or “:”.
If you see the UNIX message “…:not found” when you enter the command, it means that your PATH
variable is not setup to contain the path to the command directory of your database. Each database
environment has a directory named “bin” which contains its executable programs. The UNIX PATH
variable must contain the path to this directory in order for you to use the environment’s commands.
Depending upon the database system you have and where it is installed the path will look like one of these:
uniVerse /…/uv/bin“…” implies that the actual path variesUniData /…/udt/bin according to where your databasePI/open /…/isys/bin account was installed.
The PATH variable may be set permanently by modifying the “.profile” file in your home directory to
include the appropriate path in the PATH assignment. The problem may be resolved temporarily (until you
logout) by entering these Bourne shell commands at the UNIX prompt:
PATH=$PATH:/…/…/bin
export PATH
Note that “/…/…/bin” must be replaced with the actual appropriate pathname!
8. Set the proper terminal type for the terminal you are using with the SET.TERM.TYPE command, (e.g.
SET.TERM.TYPE tvi925).
9. Now enter the command "SENTRY". You will see a copyright screen which identifies your company
and computer system. If there are discrepancies in the data on this screen, please contact us. SENTRY is
licensed only for use at the company and on the system described on the copyright screen.
10. Enter a carriage return. You will now see the SENTRY Menu on your screen (Figure 1).
Fitzgerald & Long
SENTRY User’s Guide Introduction - 7
SENTRY Main Menu 07 AUG 2000
1. Database Creation and Validation Menu
2. Database Maintenance Menu
3. Reports Menu
4. Utilities Menu
Please select one of the above:
Figure 1 - Main Menu
11. At this point you are ready to begin loading your data into the SENTRY database. This procedure is
described in the following section “Getting Started”.
Fitzgerald & Long
Introduction - 8 SENTRY User’s Guide
GETTING STARTED
This section describes how to invoke the SENTRY Main Menu. It also describes the copyright and the
validation screen which will be displayed as you enter SENTRY. Additionally, the first three steps for
loading the SENTRY database are presented.
< < S E N T R Y - Serial Number 00.08.70100 > >
This version of SENTRY has been prepared expressly for
Fitzgerald & Long, Inc.
12341 East Cornell Avenue
Aurora, Colorado
and may be used there only on the following computer system:
Hewlett-Packard 9000-E25, PI/Open Serial # 999999
Any other use is in violation of the license and is forbidden.
Figure 2 - This is an example of the SENTRY copyright screen.
Having restored SENTRY from tape and installed the software, you are ready to proceed with this section.
SENTRY is installed as a directory named sentry; this directory is also setup as a standard database
account. To access SENTRY you must be “in” the sentry account – that is, sentry must be your present
working directory. To reach sentry from the UNIX prompt, use the UNIX “cd” command followed by
the command to invoke your database environment (e.g. “uv”, “udt” or “piopen”). To reach sentry
from TCL in another account use the TCL “LOGTO” command.
Since SENTRY is a security product, it won’t allow just any user to use it to modify your system! Only
users whose UNIX UID is 0 (zero) will be permitted to enter SENTRY. Users with the UID of 0 are
referred to as “super users” because they have the power to do nearly anything on the system. The
standard user “root” is an example of a “super user”. The passwords to super user logins should be
carefully protected!
Fitzgerald & Long
SENTRY User’s Guide Introduction - 9
Our recommendation is that you create a userid called sentry with the UID of 0 (zero). This user will have
“sentry” as its “home” directory and will invoke the database on login. Suggestion: use SENTRY to
create this user while “getting started” with SENTRY.
At TCL, enter:
SENTRY
The SENTRY copyright screen (Figure 2) will be displayed. This screen reminds you that SENTRY is
protected by copyright law and is licensed for use to the company and computer system named on the
screen. Under no circumstances may you use the SENTRY software for any other company and/or
computer system than the one for which this copy of SENTRY was prepared, without the written
permission of Fitzgerald & Long, Inc.
The copyright screen awaits a <RETURN>.
Validating System Administrator authority.....
You must be super-user to use SENTRY!
Press <RETURN> to continue :
Figure 3 - This screen is displayed immediately after the copyright screen in the previous figure. You
will see the second line “You must be super user to use SENTRY” only if your user ID has a UID other
than 0 (zero).
NOTE: If another user is logged in as the System Administrator and attempts to use SENTRY, the
following message will be displayed.
SENTRY is currently being run by user n.
Fitzgerald & Long
Introduction - 10 SENTRY User’s Guide
This is a safety precaution. SENTRY is a very powerful tool and should only be used by the System
Administrator or his designee. SENTRY is designed to be a single user utility. Therefore, only one user at
a time is allowed into SENTRY.
The third SENTRY screen (Figure 3) informs you that SENTRY is validating that your user ID has a UID
of 0 (zero). If it does NOT, you will see the message:
“You must be a super-user to use SENTRY!”
The validation screen may flash by so quickly that you cannot read it because the test for UID = 0 is so
quick. Unless the validation fails, SENTRY will display the Main Menu.
The SENTRY Main Menu
There are four selections on the SENTRY Main Menu. These are:
1. Database Creation and Validation Menu
2. Database Maintenance Menu
3. Reports Menu
4. Utilities Menu
Choose selection one, Database Creation and Validation Menu. This selection presents another
menu which has three more choices. Each selection in each menu is documented thoroughly in the User
Guide. Simply look for the User Guide section that corresponds to the number of the menu selection. For
example, to get to the second selection of the Database Creation and Validation Menu you first entered “1”
from the Main Menu and then entered “2” from the next menu. In the User Guide you will find
documentation about this selection in section 1.2.
Read the appropriate section of the User Guide for each of the three selections in the Database Creation
and Validation Menu and then execute each one in turn. They perform the following tasks to setup your
SENTRY database:
1. Upload User and Group Profiles from UNIX - this program will read your UNIX passwd and
group files and create database records in SENTRY for all the users and groups which have been setup on
your system. The process will take just a few seconds.
2. Create Database from File System - this program scans the locals disks on your system and
builds cross reference information in SENTRY about the directories and files it finds. The cross reference
uses a sophisticated database structure known as a “balanced B-tree” - this will allow SENTRY to locate
objects on your disk nearly instantaneously! Because this is a complex task it will take longer, perhaps as
long as an hour or more. The appropriate section of the User Guide describes a technique for running this
program as a “phantom” or “background” task to avoid tying up your terminal.
3. Validate the User Profile Database - this program validates the logical integrity of the data you
have uploaded into SENTRY. It will print a report of any problems and inconsistencies it finds. If you
Fitzgerald & Long
SENTRY User’s Guide Introduction - 11
wish to send the report to a specific printer, form or destination use the SETPTR command to set your
printer parameters before executing this selection.
After performing these steps your SENTRY database reflects the actual state of your system. You may
now use the Database Maintenance Menu to fix the inconsistencies reported by the validation program or
to modify users, groups and file permissions. You may also begin to protect database commands. The
Reports Menu will print a variety of useful reports which will allow you to view the data you have
collected. The Utilities Menu contains a number of tools which will occasionally be useful.
Complete documentation for each menu and selection in SENTRY is contained in the next sections of this
User Guide.
Fitzgerald & Long
Introduction - 12 SENTRY User’s Guide
INTRODUCING THE MAIN MENU
SENTRY'S Main Menu follows the copyright screen and the System Administrator validation screen. It is
the entry point into the four submenus. The four submenus are presented as selections 1 through 4 (Figure
4).
SENTRY Main Menu 07 AUG 2000
1. Database Creation and Validation Menu
2. Database Maintenance Menu
3. Reports Menu
4. Utilities Menu
Please select one of the above: 1
Figure 4 - This is an example of SENTRY’s Main Menu which provides access to the four submenus and
divides SENTRY into four logical sections.
These four selections outline the four logical divisions of SENTRY. Each division is a collection of
programs which perform related tasks.
The documentation mirrors this organization: There are four major sections. Each section is introduced via
a figure of the Main Menu and a short description of the processes which may be performed from that
particular menu selection. Note that the section topic appears in bold print to amplify the Main Menu
selection used to invoke the submenu for that topic.
Each submenu is introduced in the same manner. Each selection on each submenu is documented through a
sample screen. A description of each field and its use is presented.
In using the menus please note that "on-line" help is available. At the menu selection prompt, enter
HELP <RETURN>
Then enter the number of the menu item for which you would like to receive help.
Fitzgerald & Long
SENTRY User’s Guide Introduction - 13
The first selection, Database Creation and Validation Menu offers access to programs which upload
the information in the UNIX passwd and group files into SENTRY's database. Another program
transverses the disks, reading the permissions, owner and group for each file and directory and loading
cross reference information into SENTRY's database. Once the data are loaded, you should test the
consistency of the data by executing the validation program.
The second selection, Database Maintenance Menu, is the menu for all data entry programs. You
may create, delete, and modify users, groups and file permissions. You may also protect commands,
peruse files and directories and modify SENTRY system parameters.
This second submenu displays six selections. These are programs to maintain the system profile, user
profiles, groups, the file system, SENTRY's Command Protection and SENTRY's User Defined Item
Protection.
The third selection on SENTRY's Main Menu invokes the Reports Menu. This submenu provides
access to reports. These reports describe all aspects of the SENTRY database from the perspectives of
system, users, groups, permissions, access violations and SENTRY protected database commands.
The fourth selection on SENTRY's Main Menu is the Utilities Menu. This submenu provides a collection
of programs to perform such tasks as duplicating Command Protection in one account like that in another
account, purging the Violations Log, and rebuilding the cross reference files. You may also use a tool
which will generate new passwords for all or selected users. Yet another utility will update the VOC of a
protected account with the command protection setup through SENTRY, insuring consistency.
The following sections will describe each menu in detail. Each selection of each submenu is described with
examples of the screens and prompts available through these programs.
Fitzgerald & Long
SENTRY User’s Guide Section 1 - 1
1. INTRODUCING THE DATABASE CREATION
AND VALIDATION MENU
The first selection of SENTRY's Main Menu is Database Creation and Validation. This menu provides
access to programs which will build SENTRY’s database from your existing user, group and file system
data.
SENTRY Main Menu 07 AUG 2000
1. Database Creation and Validation Menu
2. Database Maintenance Menu
3. Reports Menu
4. Utilities Menu
Please select one of the above: 1
Figure 5 - Database Creation and Validation is the first selection on the Main Menu.
These programs provide a quick and easy way to document your existing system. Because all of the data
are loaded into SENTRY's database, comprehensive reports are available. Additionally, These programs
simplify most of the data entry tasks usually associated with setting up a new security system.
Complimentary to the programs which build the SENTRY database is a program to evaluate the
consistency of usage in groups, users, and permissions.
The three selections in the Database Creation and Validation Menu are the first three steps you
should take after installing SENTRY. The following sections provide detailed descriptions on how, when
and why these programs are used.
Fitzgerald & Long
Section 1 - 2 SENTRY User’s Guide
1.0 DATABASE CREATION AND VALUDATION MENU
This is the first submenu accessible from SENTRY's Main Menu. It is also the first selection you will
make after installing SENTRY. Through this menu, you will execute programs which load all the UNIX
passwd and group information on your system into SENTRY's database.
SENTRY Database Creation and Validation Menu 07 AUG 2000
1. Upload User and Group Profiles from UNIX
2. Create Database from File System
3. Validate the User Profile Database
"<RETURN>" to return to previous menu
Please select one of the above:
Figure 6 - The Database Creation and Validation Menu provides access to three programs through
which you may create and validate the SENTRY database.
Three processes are available in this menu. These provide the capability of uploading the passwd and
group files into the SENTRY database, uploading file system information and validating the SENTRY
database.
The first selection, 1. Upload User and Group profiles from UNIX reads your existing UNIX
passwd and group files and writes the information into SENTRY's database. This is the first program you
will execute after SENTRY is installed.
The second selection, 2. Create Database from the File System transverses your local file systems
reading all information and creating B-trees to index this information. Note that no remote (NFS) disks are
read.
After SENTRY's database has been loaded with the passwd, group and file system data, selection 3. Validate the User Profile Database is used to test the consistency of the data in SENTRY's database.
Tests include checks to insure that permissions do not reference users who do not exist in the passwd file or
groups which have no registered users. Following extensive validation, a report is produced which
documents the inconsistencies found.
The following sections present a detailed description of each program, the screens and the prompts.
Fitzgerald & Long
SENTRY User’s Guide Section 1 - 3
Fitzgerald & Long
Section 1 - 4 SENTRY User’s Guide
1.1 UPLOAD USER AND GROUP PROFILES FROM UNIX
This program loads the data from the UNIX passwd and group files into the SENTRY database. Existing
data in the SENTRY database is checked and compared to that in these two files. The SENTRY database
is updated to reflect the same configuration as these files.
DB.LOAD SENTRY Data Base Load 08/08/00
Enter "OK" to start the loading process or "<ESC>" to exit : OK
Loading user profiles.
Loading group information.
User and group information loaded.
Figure 7 - This is an example of the “SENTRY Database Load” screen. Enter “OK” to execute the
program.
This is the first program you will execute after SENTRY is installed. After the initial upload you will use
this program on a regular basis to insure that SENTRY is consistent with your UNIX files.
To invoke this program, enter 1. Database Creation and Validation Menu on SENTRY's Main
Menu. Then, enter 1. Upload User and Group Profiles from UNIX from the submenu. This
program will be invoked.
On first entering this program, only the prompt Enter 'OK' to start the loading process: is
displayed. Enter “OK” to begin or <ESC> to exit the program.
The loading process is performed in two steps. First, the information in the passwd file is read. Second,
the group file information is loaded into the SENTRY database. The screen will report the progress of the
program as it begins each step. Figure 7 is an example of this screen after the two steps have been
completed.
After loading your system information into SENTRY, you should use the SENTRY maintenance screens to
update, add or delete users and groups. You may still continue to use the UNIX utilities to manage users
and groups, but changes made will not be reflected in the SENTRY database until you perform the upload
again.
Fitzgerald & Long
SENTRY User’s Guide Section 1 - 5
We recommend: Upload the passwd and group files into the SENTRY databases on a regular basis to
INSURE that SENTRY reflects an accurate view of your system. Because of the numerous file system
changes which occur daily in the normal course of operations, we recommend that you execute the program
which creates the file system view on a regular basis as well. These programs should be scheduled as
“over night” jobs at least once a week on systems with “normal” activity.
Because every site is unique, please discuss your system requirements with us if you are undecided about
the frequency with which you should be uploading (recreating) the SENTRY database.
The program that loads the UNIX passwd and group data into SENTRY can be run outside SENTRY’s
menu system, in “batch” mode. The program can be run at TCL, either directly or using the
“PHANTOM” command. This allows you to schedule the process via cron, BENTON or some other
utility. The command line to invoke the program is:
SENTRY.DB.LOAD (BATCH)
There is no difference in the actions performed whether the program is run from the menu for in “batch”
mode.
Fitzgerald & Long
Section 1 - 6 SENTRY User’s Guide
1.2 CREATE DATABASE FROM FILE SYSTEM
This section describes the program which create the B-trees to index your file system directories, files, file
owners and groups. On a system with a very large number of files, this process may take a number of
hours. This is a “read only” process. If does NOT interfere with your normal processing.
FILE.LOAD Load SENTRY Filesystem Data Base 10/19/00
Enter "OK" to begin processing or "<ESC>" to exit : OK
Starting phantom to build sentry.output file...
Phantom task being performed by User 4097.
Output file is "SENT978972046C".
Reading sentry.output file and building BTREE records...
Path - /usr/bin/mediainit
Count - 185
Figure 8 - This is an example of the messages displayed by the program which creates the B-tree indices
of your file system.
We are very proud of SENTRY’s balanced B-tree system of indices. Through the use of B-trees, which
are ordered cross reference files, we are able to index your entire file system offering you a “file manager”
style window to view your file structure, permissions, file owners and groups in a very efficient manner
conserving not only CPU cycles but disk storage space as well.
On entering “OK” to start execution of this program, the old B-trees (if any) are cleared. Two processes
are started. One process reads the UNIX I-node tables and writes the information into a text file. A second
process reads in the text file and creates the B-tree entries.
Because this can be a very time consuming process and should be repeated on a regular basis, SENTRY
offers a “batch” processing option which may be scheduled through cron or executed through a phantom
process. This command is:
SENTRY.FILE.LOAD (BATCH)
To execute as a background job enter:
PHANTOM SENTRY.FILE.LOAD (BATCH)
You must be in the “sentry” directory to execute this job. Therefore, if you plan to use cron, the cron
process must “cd” into the “sentry” directory BEFORE executing the command.
Fitzgerald & Long
SENTRY User’s Guide Section 1 - 7
1.3 VALIDATE THE USER PROFILE DATABASE
This program is used to check the consistency of the users, groups and permissions which have been loaded
into the SENTRY database via the first two programs described in this section. user IDs, groups, and their
usage in the file system are analyzed and inconsistencies are reported. For example, the validation report
might point out a file whose owner is not registered or a home pathname which does not exist on the
system.
VALIDATION SENTRY Database Validation 08/16/00
Enter "OK" to start the validation or "<ESC>" to exit : OK
Do you want to print missing password messages? (Y/N) or <ESC> to exit: N
Figure 9 - This is an example of the messages displayed to the user during the execution of the validation
program.
Validating the data you have loaded from your passwd and group files and from the file system is the third
step which should be performed when you are first building the SENTRY database. Using this program
you will be able to locate and correct any inconsistencies in your user profiles and groups. Use this
program any time you wish to test for consistency of usage of user IDs, groups and file system protection.
We encourage you to use it EVERY TIME you upload data from the passwd and group files and when you
rebuild the B-tree files (which should be done on a regular basis).
Fitzgerald & Long
Section 1 - 8 SENTRY User’s Guide
This program will generate a printed report, using whatever printer setup is in effect at the time the
program is run. To modify the printer, destination or form, use the SETPTR command at the TCL prior to
running the program. Alternatively, the SENTRY XEQ function may be used to execute the SETPTR
command.
To execute this program, select 1. Database Creation and Validation Menu from the SENTRY Main
Menu. Next, select 3. Validate the User Profile Database from the Database Creation and Validation
Menu.
Enter “OK” to start the validation or “<ESC>“ to exit: - This is the first of two input prompts in
this program. If you enter “OK”, the program will continue. To exit at either prompt press <ESC> then
enter <RETURN>.
Do you want to print missing password messages?(Y/N) or <ESC> to exit:
Your answer to this prompt controls whether or not the validation program tells you about users who have
no passwords in the SENTRY database. If “Y” is entered the message
FATAL! User “USER.ID” does not have a password in the SENTRY database.
will print on the validation report.
When SENTRY retrieves the data from the passwd file, the password field is loaded into the SENTRY
database. SENTRY cannot read the password or decrypt it! Only passwords created from the User Profile
data entry screen, which are encrypted by SENTRY can be decrypted by SENTRY. Some system
administrators choose to setup and track all user passwords through SENTRY. Others choose to have
users manage their own passwords and not to maintain them in SENTRY. If you are not tracking user
passwords, the “missing password” messages will be of little use to you.
We suggest that you answer “N”o don’t print these messages unless you have created all passwords
through the User Profile data entry screen or through one of SENTRY’s password utilities.
Two types of errors are reported. These are called “FATAL” and “Warning”. “FATAL” errors are those
which we believe could possibly create a serious security issue or those which would lead to an operational
problem. The following is a list of errors which we have labeled as FATAL.
1. “User XXXXX not on the SENTRY.USERS file.” - The user name “XXXXX” was found in the
list of SENTRY users in the SENTRY.CONTROL file, but no record was found for this user in the
SENTRY.USERS file. This indicates an inconsistency in the SENTRY database; we suggest that the User
Profiles be uploaded from UNIX again (selection 1 in the Database Creation and Validation Menu.)
2. “User XXXXX does not have a password in the SENTRY database.” - The user
“XXXXX” has no password in SENTRY. This message will ONLY appear if you answered “Y” to the
prompt, “Do you want to print missing password messages?”. If you are tracking passwords
within SENTRY, this user should be assigned a password.
Fitzgerald & Long
SENTRY User’s Guide Section 1 - 9
3. “Password for User XXXXX is less than N characters.” - The user “XXXXX” has a
password which is shorter than the minimum password length specified in the SENTRY System Profile
screen, which is N. This user’s password should be updated to conform to the minimum length restrictions
you have instituted.
4. “User XXXXX has no home directory.” - The user “XXXXX” has no home directory specified.
This would prevent the user from logging in, as UNIX would not know where to attach the user upon login.
The user should be updated and assigned a home directory.
5. “User XXXXX has an invalid home directory - /ZZZZZ.” - The user “XXXXX” has a home
directory in the SENTRY database of “/ZZZZZ”, but SENTRY cannot locate this directory on your file
system. Perhaps the directory was removed after it was assigned as the user’s home directory. The user
should be updated and assigned a valid home directory.
6. “Group XXXXX is not on the SENTRY.GROUPS file.” - A Group name was found in
SENTRY’s control list which does not exist in the SENTRY.GROUPS file. This indicates that one of
SENTRY’s database files is damaged and should be rebuilt. Upload the passwd and group files to fix this
problem.
7. “Command XXXXX not on the SENTRY.COMMANDS file.” - A VOC protection item was
found in SENTRY’s control list which does not exist in the SENTRY.COMMANDS file. This indicates
that one of SENTRY’s database files is damaged and should be rebuilt.
Errors beginning with the word “Warning” are informational - not serious database issues but situations
you should be aware of. The following is a list of those warnings.
1. “User XXXXX will default to “other” protection on all objects and commands.” - The
user “XXXXX” is not specifically mentioned, either by user ID or group membership, in the permissions
for any file system object or any VOC command protected by SENTRY. He will fall into the “other”
category for all protection on the system. This is NOT a problem, but could serve as an indication of a
user ID which is obsolete and no longer used.
2. “Group XXXXX is not used by any user.” - The group “XXXXX” is not being used by any user
on the system. Therefore, no users will receive their access permissions via this group. This may be a
group which is obsolete and should be removed or renamed.
3. “Group XXXXX is not used to protect any object or command.” - The group “XXXXX” is
not referenced in the permissions for any disk object or any VOC command. It may be assigned to users,
but is not used to protect anything. This might be an obsolete group which should be removed or renamed.
4. “Owner (UID) XXXXX on /ZZZZZ does not exist.” - The user ID number “XXXXX” is the
owner of a disk object whose path is “/ZZZZZ”. However, there is no user who is assigned this user ID
number. Possibly, there once was a user but he has been deleted. The owner for this disk object should be
replaced with a valid user on the system. Alternatively, a new or existing user could be assigned the same
user ID number (UID).
Fitzgerald & Long
Section 1 - 10 SENTRY User’s Guide
5. “Group (GID) XXXXX on /ZZZZZ does not exist.” - The group number “XXXXX” is the
registered group for a disk object whose path is “/ZZZZZ”. However, the group does not exist in
SENTRY. Possibly, the group once existed but has been deleted. The group for this disk object should be
replaced with a valid group on the system. Alternatively, a new or existing group could be assigned the
same group number (GID).
6. “Command /VVVVV does not have any groups or users assigned.” - The database
command whose path is “/VVVVV” has only “other” access rights assigned. No users or groups are
referenced in the command’s protection. This may be because only “other” access rights are needed;
everyone may have the same rights to the command. However, you should review the command protection
to be sure it is what you intend.
7. . “User (UID) XXXXX on command /VVVVV does not exist.” - The user ID number
“XXXXX” is referenced in the protection for a database command whose path is “/VVVVV”. However,
there is no user who is assigned this user ID number. Possibly, there once was a user but he has been
deleted. The user in this command’s protection should be replaced with a valid user on the system.
Alternatively, a new or existing user could be assigned the same user ID number (UID).
8. “Group (GID) XXXXX on command /VVVVV does not exist.” - The group number “XXXXX”
is referenced in the protection for a database command whose path is “/ZZZZZ”. However, the group does
not exist in SENTRY. Possibly, the group once existed but has been deleted. The group in this
command’s protection should be replaced with a valid group on the system. Alternatively, a new or
existing group could be assigned the same group number (GID).
As the validation program progresses four messages will appear. These are:
Validating user profiles
Validating groups
Validating file owners & groups
Validating COMMANDs
When these four sections of the validation program are completed SENTRY will display “Problems found during validation, See Validation Report for Details.” The message “Database Invalid”
will appear at the bottom of the screen if FATAL errors are encountered. If only WARNINGS are found
the message displayed is “Questionable data found during validation.”
Fitzgerald & Long
SENTRY User’s Guide Section 1 - 11
Fitzgerald & Long
Loading...
+ 83 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.