Benutzeranleitung / Produktwartung Sentry des Produzenten Fitzgerald & Long
Zur Seite of 113
SENTRY The Integrated Security System Release 4 User Guide Fitzgerald & Long 12341 E. Cornell Avenue, #18 Aurora, Colorado 80014 - 3323 USA Phone: (303) 755 - 1102 FAX: (303) 755 - 1703.
NOTICE The information contained in this guide is s ubject to change without notice. Fitzgerald & Long, Inc. shall not be liable for technical or editorial omissions made herein; nor for incidental or consequential damages resulting from the furnishing, performance, or use of this material.
Table Of Contents USING THIS GUIDE ---------------------------------------------------------------------------------------- Intro - 1 USING THE SCREENS ------------------------------------------------.
.
SENTRY User ’ s Guide Introduction - 1 Fitzgerald & Long USING THIS GUIDE The SENTRY User's Guide is comprehensive in its descriptions of all of SENTRY's menus, data entry screens and reports. The Guide follows the same structure as the SENTRY menu system.
Introduction - 2 SENTRY User ’ s Guide Fitzgerald & Long PI/open the command prompt is indicated by a colon “ : ” while for uniVerse the prompt is a greater - than sign “ > ” .
SENTRY User ’ s Guide Introduction - 3 Fitzgerald & Long USING THE SCREENS SENTRY data entry screens feature some very helpful functions. These include "repaint", "backup", "escape" (exit without update), “execute ” and "help".
Introduction - 4 SENTRY User ’ s Guide Fitzgerald & Long Data Entry Conventions Underscore/underline When awaiting data, the cursor is positioned at t he beginning of the field. The field is delineated by underscores. A sentence describing the field is displayed at the bottom of the screen.
SENTRY User ’ s Guide Introduction - 5 Fitzgerald & Long INSTALLING SENTRY Installing the SENTRY software is very simple! Just follow these easy steps.
Introduction - 6 SENTRY User ’ s Guide Fitzgerald & Long 6. Notice a file named "install". This is a script which will perform the steps necessary to install the SENTRY software. Execute the script by entering: ./install 7. Next type the command to enter your database environment (uv, udt, piopen).
SENTRY User ’ s Guide Introduction - 7 Fitzgerald & Long SENTRY Main Menu 07 AUG 2000 1. Database Creation and Validation Menu 2. Database Maintenance Menu 3. Reports Menu 4. Utilities Menu Please select one of the above: Figure 1 - Main Menu 11.
Introduction - 8 SENTRY User ’ s Guide Fitzgerald & Long GETTING STARTED This section describes how to invoke the SENTRY Main Menu. It also describes the copyright and the validation screen which will be displayed as you enter SENTRY. Additionally, the first three steps for loading the SENTRY database are presented.
SENTRY User ’ s Guide Introduction - 9 Fitzgerald & Long Our recommendation is that you create a userid called sentry with the UID of 0 (zero). This user will have “ sentry ” as its “home” directory and will invoke the database on login.
Introduction - 10 SENTRY User ’ s Guide Fitzgerald & Long This is a safety precaution. SENTRY is a very powerful tool and should only be used by the System Administrator or his designee. SENTRY is designed to be a single user utility. Therefore, only one user at a time is allowed into SENTRY.
SENTRY User ’ s Guide Introduction - 11 Fitzgerald & Long wish to send the report to a specific printer, form or destination use the SETPTR command to set your printer parameters before executing this selection. After performi ng these steps your SENTRY database reflects the actual state of your system.
Introduction - 12 SENTRY User ’ s Guide Fitzgerald & Long INTRODUCING THE MAIN MENU SENTRY'S Main Menu follows the copyright screen and the System Administrator validation screen. It is the entry point into the four submenu s. The four submenus are presented as selections 1 through 4 (Figure 4).
SENTRY User ’ s Guide Introduction - 13 Fitzgerald & Long The first selection, Database Creation and Validation Menu offers access to programs which upload the information in the UNIX passwd and group files into SENTRY's database.
.
SENTRY User ’ s Guide Section 1 - 1 Fitzgerald & Long 1. INTRODUCING THE DATABASE CREATION AND VALIDATION MENU The first selection of SENTRY's Main Menu is Database Creation and Validation. This menu provides access to programs which will build SENTRY ’ s database from your existing user, group and file system data.
Section 1 - 2 SENTRY User ’ s Guide Fitzgerald & Long 1.0 DATABASE CREATION AND VALUDATION MENU This is the first submenu accessible from SENTRY's Ma in Menu.
SENTRY User ’ s Guide Section 1 - 3 Fitzgerald & Long.
Section 1 - 4 SENTRY User ’ s Guide Fitzgerald & Long 1.1 UPLOAD USER AND GROUP PROFILES FROM UNIX This program loads the data from the UNIX passwd and group files into the SENTRY database. Existing data in the SENTRY database is che cked and compared to that in these two files.
SENTRY User ’ s Guide Section 1 - 5 Fitzgerald & Long We recommend: Upload the passwd and group files into the SENTRY databases on a regular basis to INSURE that SENT RY reflects an accurate view of your system.
Section 1 - 6 SENTRY User ’ s Guide Fitzgerald & Long 1.2 CR EATE DATABASE FROM FILE SYSTEM This section describes the program which create the B - trees to index your file system directories, files, file owners and groups. On a system with a very large number of files, this process may take a number of hours.
SENTRY User ’ s Guide Section 1 - 7 Fitzgerald & Long 1.3 VALIDATE THE USER PROFILE DATABASE This p rogram is used to check the consistency of the users, groups and permissions which have been loaded into the SENTRY database via the first two programs described in this section.
Section 1 - 8 SENTRY User ’ s Guide Fitzgerald & Long This program will generate a printed report, using whatever printer setup is in effect at the t ime the program is run. To modify the printer, destination or form, use the SETPTR command at the TCL prior to running the program.
SENTRY User ’ s Guide Section 1 - 9 Fitzgerald & Long 3 . “Password for User XXXXX is less than N characters.” - The user “XXXXX ” ha s a password which is shorter than the minimum password length specified in the SENTRY System Profile screen, which is N .
Section 1 - 10 SENTRY User ’ s Guide Fitzgerald & Long 5. “Group (GID) XXXXX on /ZZZZZ does not exist.” - The group number “XXXXX ” is the r egistered group for a disk object whose path is “ /ZZZZZ ” . However, the group does not exist in SENTRY.
SENTRY User ’ s Guide Section 1 - 11 Fitzgerald & Long.
.
SENTRY User ’ s Guide Section 2 - 1 Fitzgerald & Long 2. INTRODUCING THE DATABASE MAINTENANCE MENU The second selection on SENTRY's Main Menu is 2.
Section 2 - 2 SENTRY User ’ s Guide Fitzgerald & Long 2.0 DATABASE MAINTENANCE This is the second sub - menu access ible from SENTRY ’ s Main Menu. It is the menu you will use to make changes to the SENTRY database. You may create or modify users, groups and permissions through this menu.
SENTRY User ’ s Guide Section 2 - 3 Fitzgerald & Long 4. File System. This entry allows you to scroll through your UNIX tree stru cture much like you do in Window ’ s File Manager. From this selection you may request “ file detail ” information which is read from the UNIX I - node.
Section 2 - 4 SENTRY User ’ s Guide Fitzgerald & Long 2.1 SYSTEM PROFILE MAINTENANCE This data entry program is used to display and change the system profile parameters. A number of these parameters are system specific and must be set to reflect YOUR system ’ s limits.
SENTRY User ’ s Guide Section 2 - 5 Fitzgerald & Long 1. Null Passwords Allowed - The default of this field is “ N ” . When set to “ N ” o, each user must have a password. If this field is set t o “ Y ” es, you may create a user with a null password.
Section 2 - 6 SENTRY User ’ s Guide Fitzgerald & Long • Each password must contain at least two alphabetic characters and at least one numeric or special character. • Each password must differ from the user name and from any reverse or circular shift of that nam e.
SENTRY User ’ s Guide Section 2 - 7 Fitzgerald & Long However, we recommend using UIDs smaller than 5 digits simply to make them easier to read. The d efault and recommended value for this field is 1000. 13. Maximum GID Number - This field defines the largest number which may be used as a GID.
Section 2 - 8 SENTRY User ’ s Guide Fitzgerald & Long Note that the indexing occurs at the time that the “ Create Database from File System ” program is run from the Database Creation and Validation Menu. If the punctuation characters used are changed, the program must be rerun to put the new indexing into effect.
SENTRY User ’ s Guide Section 2 - 9 Fitzgerald & Long 1. Minimum password change (days): Enter the number of days before a user is allowed to change his existing password.
Section 2 - 10 SENTRY User ’ s Guide Fitzgerald & Long 2.2 USER MAINTENANCE This data entry program is used to display, change, and delete user IDs, including documentation for the user, UID, GID, home directory, and initial startup command. Additionally, all supplementary groups are displayed in this screen.
SENTRY User ’ s Guide Section 2 - 11 Fitzgerald & Long SENTRY database using the user ’ s name, enter “ @ ” followed by the first or last name of the user. For example, if you wanted to search for user IDs for Peggy Long, you could enter “ @long ” .
Section 2 - 12 SENTRY User ’ s Guide Fitzgerald & Long configured (through the System Profile screen) to generate alphanumeric passwords, which will contain at least 1 numeric character. If the System Profile is set to allow null passwords to be optional, you may <RETURN> past this prompt leaving it null.
SENTRY User ’ s Guide Section 2 - 13 Fitzgerald & Long 8. Command - This field normally defines the startup UNIX shell the user invokes. The System Profile provides a “default ” . If you wish to use the default yo u need only press <RETURN>.
Section 2 - 14 SENTRY User ’ s Guide Fitzgerald & Long new password for 90 days before he was forced by UNIX to enter a new password. This is 90 calendar days. 3. Password change warning (days): Enter the number of days before a new password is required that you would like UNIX to warn the user that his passwo rd is about to expire.
SENTRY User ’ s Guide Section 2 - 15 Fitzgerald & Long To exit you must sav e your changes by entering “ F ” . If you make no changes or wish to cancel your session without saving changes, enter “ <ESC> “ . The User Maintenance screen will be redisplayed sans data.
Section 2 - 16 SENTRY User ’ s Guide Fitzgerald & Long /jaf Enter "<ESC>" to quit : Figure 17 - This is an example of the list of files owned by the user being deleted - Selection A. B) Continue to delete the user / leave files as they are.
SENTRY User ’ s Guide Section 2 - 17 Fitzgerald & Long D) Do not delete this user. This option allows the user to return to the main User Maintenance menu without altering the user ID or the file system. No changes are made. To select this option enter “ D ” .
Section 2 - 18 SENTRY User ’ s Guide Fitzgerald & Long 2.3 GROUP MAINTENANCE Through this data entry program you may add and delete groups from the system, add a descriptive text field to document a group a nd assign the group ’ s GID. GROUP.MAINT Group Maintenance 08/07/00 Group : adm 1.
SENTRY User ’ s Guide Section 2 - 19 Fitzgerald & Long 2. GID - This is the number assigned to this group name. You may use “ @ ” for a list of all groups and their associated GID ’ s. You may assign a number or enter “ N ” and SENTRY will assign the next available number.
Section 2 - 20 SENTRY User ’ s Guide Fitzgerald & Long In UNIX every file has an owner and a group. The references to owners and groups are the UID and the GID for each. The actual names are NOT stored, only the number. The numbers are transl ated by various UNIX utilities through a “lookup ” process in the passwd and group files.
SENTRY User ’ s Guide Section 2 - 21 Fitzgerald & Long GROUP.MAI NT Group Maintenance 08/14/00 Files owned by group 140 (devel) /jaf Enter "<ESC>" to quit : Figure 23 - This is an example of the list of files owned by the group “ devel ” .
Section 2 - 22 SENTRY User ’ s Guide Fitzgerald & Long D) Do not delete this group. This option allows the user to return to the main Group Maintenance menu without altering the group or the file system. No changes are made. To select this option enter “ D ” .
SENTRY User ’ s Guide Section 2 - 23 Fitzgerald & Long 2.4 FILE SYSTEM With this program you may change owners, groups and the permissions for any file or directory in your file system. With Sentry ’ s extensive B - tree system of cross references, you may use this program to locate the path to any object on your system.
Section 2 - 24 SENTRY User ’ s Guide Fitzgerald & Long FILE.MANAGER General File Utility 16:24:02 07 AUG 2000 CURSOR.MAIN ========================================================================= HELP for "Cursor Control and Commands" There are twenty comma nds which may be entered at any position on the screen.
SENTRY User ’ s Guide Section 2 - 25 Fitzgerald & Long One of the most valuable functions of this program is the ability to find files and directories without knowing the full path or the full name in some cases. To use the cross reference enter “ @ ” .
Section 2 - 26 SENTRY User ’ s Guide Fitzgerald & Long FILE.MAINT Detailed File View 08/08/00 File Pathname : /.elm/last_read_mail File Type : normal file Inode : 11470 No of Links : 1 Size (Bytes) : 1129 Last Access : Wed Feb 1 10:11:35 2000 Last Modify : Wed Feb 1 10:11:35 2000 Last Change : Sat Aug 6 00:01:27 2000 1.
SENTRY User ’ s Guide Section 2 - 27 Fitzgerald & Long In the lower half of the screen the file owner, group and permissions are displayed. You may use this screen to modify a ny of these three fields. 1. Owner - SENTRY displays the UID of the file owner plus the user ID (may be more than one) for the displayed UID.
Section 2 - 28 SENTRY User ’ s Guide Fitzgerald & Long ACLs Maintenance Access Control Lists (ACLs) are an extension the standard UNIX file permissions.
SENTRY User ’ s Guide Section 2 - 29 Fitzgerald & Long This is an example of the “ACL Maintenance Screen ” . Not all UNIX systems support ACLs. Additionally, you may elect not to use them. If your copy of SENTRY displays this screen you may create and change ACLs with this program.
Section 2 - 30 SENTRY User ’ s Guide Fitzgerald & Long.
SENTRY User ’ s Guide Section 2 - 31 Fitzgerald & Long The next field “ 3. Permissions ” consists of three sets of three permissions. In our example they are “ rwx rwx --- ” . The first three, left most c haracters are the rights assigned to the Owner.
Section 2 - 32 SENTRY User ’ s Guide Fitzgerald & Long the user is not the owner and not a member of the group associated with a file, the permissions displayed for the user will be that of “other ” .
SENTRY User ’ s Guide Section 2 - 33 Fitzgerald & Long FILE.MANAGER General File Ut ility 14:39:56 18 AUG 2000 Path : / (32 entries.) Access shown for group piadm (9) top... -- > drwx------ root mail --- .elm - r -- r -- r -- bin bin r -- .profile - r -- r -- r -- bin bin r -- .
Section 2 - 34 SENTRY User ’ s Guide Fitzgerald & Long 2.5 COMMAND MAINTENANCE This program is used to update protection of VOC items in uniVerse, PI/open and UniData accounts. It is also a convenient means of reviewing the existing protection (created by SENTRY) which may be in effect.
SENTRY User ’ s Guide Section 2 - 35 Fitzgerald & Long To execute this program, select 2. Database Maintenance Menu from SENTRY's Main Menu ; then, select 5. Database Commands from the Database Maintenance Menu. The Command Maintenance program will be invoked.
Section 2 - 36 SENTRY User ’ s Guide Fitzgerald & Long X - Execute from inside a program only UX - Both use at database prompt and from within a program ALL - Unlimited use NONE - No use The default protection is “ NONE ” . 4. Users - Enter the user ID for which you wish to define protection rights.
SENTRY User ’ s Guide Section 2 - 37 Fitzgerald & Long Enter Field Number, "F"ile, "DEL"ete or <ESC> to Exit: - This is the main modifications prompt for this data entry screen. If you wish to change any of the information, enter the number assoc iated with the entry field, 1 through 7.
Section 2 - 38 SENTRY User ’ s Guide Fitzgerald & Long 2.6 USER ITEM PROTECTION MAINTENANCE This is a special SENTRY feature which allows you to define SENTRY security objects. These objects may be accessed through subroutine calls to solve unique security problems which may not be met thro ugh permissions and VOC item security facilities.
SENTRY User ’ s Guide Section 2 - 39 Fitzgerald & Long To execute this program, select 2. Database Maintenance Menu from SE NTRY's Main Menu ; then, select 6. User Defined Items from the Database Maintenance Menu . The User Item Protection Maintenance program will be invoked.
Section 2 - 40 SENTRY User ’ s Guide Fitzgerald & Long 5. Groups - This is a input window used to enter the groups associated with this User Item. Enter the name of a group. The groups entered must already exist in the SENTRY database. A list of groups may be viewed by entering " @ " at this input prompt.
SENTRY User ’ s Guide Section 2 - 41 Fitzgerald & Long To save changes you have made to the User Items, enter " F " to file. After filing or deleting a User Item, the screen will be repainted and you will be prompted for a User Item name.
Section 2 - 42 SENTRY User ’ s Guide Fitzgerald & Long Enter Line # of Groups (or Users) (1 - N), "A"dd, "F"orward or "B"ack Page: - When using the Groups or Users windows, you will see the prompt "Enter line # of Groups (or Users) (1 - n) or " A "dd.
SENTRY User ’ s Guide Section 3 - 1 Fitzg erald & Long 3. INTRODUCING THE REPORTS MENU The third selection on SENTRY's Main Menu is 3. Reports Menu . Through this selection you may print reports documenting the system environment, user details, group details, and VOC item protection.
Section 3 - 2 SENTRY User ’ s Guide Fitzgerald & Long 3.0 REPORTS MENU This is the third submenu accessible from SENTRY's Main Menu . All reports are printed from this menu. You may select any of six reports. Set your default printer parameters BEFORE entering SENTR Y.
SENTRY User ’ s Guide Section 3 - 3 Fitzg erald & Long Selection five Command Protection , is the same information as selection four except the report is sorted by the name of the command which is protected. A list of accounts where that command is prot ected is displayed.
Section 3 - 4 SENTRY User ’ s Guide Fitzgerald & Long 3.1 SYSTEM PROFILE REPORT Selection one, System Profile , generates a report detailing the contents of SENTRY ’ s system limits record.
SENTRY User ’ s Guide Section 3 - 5 Fitzg erald & Long Minimum Password Length - This is a UNIX defined parameter as well as one used by SENTRY when new users are created. Passwords may be 0 (zero) to “ your maximum value ” in length. However, most UNIX systems do not recognize more than 8 (eight) characters.
Section 3 - 6 SENTRY User ’ s Guide Fitzgerald & Long embedded numeric. The default and recommended value is ALPHA which will generate a string of alphabetic characters, the length defined by the Minimum Password Length field.
SENTRY User ’ s Guide Section 3 - 7 Fitzg erald & Long Maximum user ID Length - This field contains a number defining the maximum number of characters allowed for a user ID.
Section 3 - 8 SENTRY User ’ s Guide Fitzgerald & Long Punct for File Indexing - SENTRY builds B - trees to provide rapid cross referencing into the file system. For example, let ’ s imagine that you are looking for a file called “ payroll.something ” .
SENTRY User ’ s Guide Section 3 - 9 Fitzg erald & Long 3.2 USER PROFILES The SENTRY User Profile Report displays all parameters in effect for each user re gistered in your system. Additionally such information as the users name, department and telephone may be added to the system data.
Section 3 - 10 SENTRY User ’ s Guide Fitzgerald & Long UID - UNIX maintains a relationship between users and files by assigning ownership via the UID, the user ’ s number. To maintain the translation of UIDs to user IDs (used by the file system), t he Administrator should take care when creating or changing this relationship.
SENTRY User ’ s Guide Section 3 - 11 Fitzg erald & Long 3.3 GROUPS REPORT The SENTRY Groups Report displays, in a very concise format, all data related to groups on your system. Along with the name and description of each group are all user IDs associated with the group.
Section 3 - 12 SENTRY User ’ s Guide Fitzgerald & Long GID for Users - The users listed in this field are assigned this group in the passwd file .
SENTRY User ’ s Guide Section 3 - 13 Fitzg erald & Long 3.4 ACCOUNT PROTECTION REPORT This is a report of all protected commands on your system. It is sorted by account such that there is one page per account printed. Note that the account pathname appears in the title of the report.
Section 3 - 14 SENTRY User ’ s Guide Fitzgerald & Long Description - The description field is used for documentation and may be entered through the Database Maintenance program for Database Commands.
SENTRY User ’ s Guide Section 3 - 15 Fitzg erald & Long 3.5 COMMAND P ROTECTION REPORT The SENTRY Command Protection Report presents an alphabetical listing of all commands protected through SENTRY's Database Commands program. SENTRY.COMMANDS.
Section 3 - 16 SENTRY User ’ s Guide Fitzgerald & Long Group Name & Rights - This field displays the names of groups (if any) used to define the access to this command and the rights given to these groups. The names of the groups MUST be registered UNIX group names.
SENTRY User ’ s Guide Section 3 - 17 Fitzg erald & Long 3.6 ACCESS VIOLATIONS REPORT The SENTRY Access V iolations Report is an audit report of violations logged by SENTRY for Database Commands and for User Defined Items. Each attempt to use a restricted command by an unauthorized user is reported here.
Section 3 - 18 SENTRY User ’ s Guide Fitzgerald & Long Pathname - This is the pathname to the account containing the protected VOC item which was used by an unauthorized user. Violation Item - This field provides documentation on which Command was used.
SENTRY User ’ s Guide Section 4 - 1 Fitzgerald & Long 4. INTRODUCING THE UTILITIES MENU The Utilities Menu is executed through selectio n four on the SENTRY Main Menu . The programs provided in this selection are ancillary to the job of providing sound, well documented system security.
Section 4 - 2 SENTRY User ’ s Guide Fitzgerald & Long 4.0 UTILITIES MENU This menu provides access to five utility programs designed to save the System Administrator data entry effort and time i.
SENTRY User ’ s Guide Section 4 - 3 Fitzgerald & Long Selection four, Rebuild SENTRY Cross Reference Files . Sentry maintains a number of traditional inverted lists which are used for cross referencing. When you use the “@” function you are accessing one of these lists.
Section 4 - 4 SENTRY User ’ s Guide Fitzgerald & Long 4.1 VOC PR OTECTION SETUP This program provides the convenience of being able to copy the protection set on VOC items in one account to a second account.
SENTRY User ’ s Guide Section 4 - 5 Fitzgerald & Long 4.2 PUGING THE VIOLATIONS LOG This program provides a convenient method of selectively purging the SENTRY Violations Log.
Section 4 - 6 SENTRY User ’ s Guide Fitzgerald & Long This program is constructing a query sentence to SELECT the items to be purged. When entering your criteria, think of it as though you were completing the phrase "WITH field.name EQ (or LT, GT)" to th e items you enter.
SENTRY User ’ s Guide Section 4 - 7 Fitzgerald & Long 4.3 PASSWORD CREATION This program provides a convenient utility to assist you in creating new passwords for a number of users. You may select users to be changed based upon IDs, department, project, group, and user name.
Section 4 - 8 SENTRY User ’ s Guide Fitzgerald & Long MM/DD/YY. Sentry will select all users whose password update date is earlier than this dat e.
SENTRY User ’ s Guide Section 4 - 9 Fitzgerald & Long 4. Department - If you have entered data into the “department ” field of the SENTRY.USERS file, you may use this field in your selection criteria for generating new passwords. Enter the department names separated by spaces.
Section 4 - 10 SENTRY User ’ s Guide Fitzgerald & Long 4.4 REBUILD CROSS REFERENCE FILES SENTRY maintains a number of traditional inverted lists which are used for cross referencin g. When you use the “@” function you are accessing one of these lists.
SENTRY User ’ s Guide Section 4 - 11 Fitzgerald & Long 4.5 UPDATE PROTECTED COMMANDS UPDATE.VOC Command Update 09/18/00 Account Name : _____________________________________________________ Enter the pathname to an account or ‘ ALL ’ for all accounts.
.
SENTRY User ’ s Guide Appendix 1 - 1 Fitzgerald & Long APPENDIX 1 SENTRY INTERNAL SUBROUTINES NOTICE The subroutines documented in this appendix are provided as a convenience to the user on a "USE AT YOUR OWN RISK" basis. If you wish to use these programs and need assistance we are willing to help.
Appendix 1 - 2 SENTRY User ’ s Guide Fitzgerald & Long This is the result of the encryption. If the data string is already encrypted and the encryption key is the same as was used to encrypt the data, the result will be the decrypted data. ENCRYPTION.
SENTRY User ’ s Guide Appendix 1 - 3 Fitzgerald & Long WRITE CRYPT.DATA ON FILE.VAR, REC.KEY DISPLAY.DECRYPTED SENTRY.ENCRYPT = "*SEN TRY.ENCRYPT" READ THE.RECORD FROM FILE.VAR, REC.KEY ELSE ... THE.KEY = "Fudge Tastes Good!" CALL @SENTRY.
Appendix 1 - 4 SENTRY User ’ s Guide Fitzgerald & Long ERROR.TEXT = “””” CALL @SENTRY.USER.ITEM.CONTROL(USER.ITEM, ITEM. FOUND, ACCESS.RIGHTS, ERROR.TEXT) Parameters: USER.ITEM (Input) This is the name of the item that was defined with the SENTRY User Item Maintenance screen.
SENTRY User ’ s Guide Appendix 1 - 5 Fitzgerald & Long If an error was encountered by the subroutine, an error message will be returned. If no error occurred ERROR.
Appendix 1 - 6 SENTRY User ’ s Guide Fitzgerald & Long Subroutine: SENTRY.VIOLATION.STAMP SENTRY.VIOLATION.STAMP is used to log access violations o f user items. Sample : SENTRY.VIOLATION.STAMP = "*SENTRY.VIOLATION.STAMP" CALL @SENTRY.
SENTRY User ’ s Guide Appendix 1 - 7 Fitzgerald & Long.
.
SENTRY User ’ s Guide Appendix 2 - 1 Fitzgerald & Long APPENDIX 2 SENTRY KEY BINDINGS A record called "KEY.BINDINGS" in the SENTRY.CONTROL file is used to control t he keystrokes used to activate special functions within the SENTRY data entry screens.
Appendix 2 - 2 SENTRY User ’ s Guide Fitzgerald & Long environment and reenter SENTRY in order for the changes to take effect because these variables are rea d into named COMMON.
SENTRY User ’ s Guide Appendix 2 - 3 Fitzgerald & Long.
Ein wichtiger Punkt beim Kauf des Geräts Fitzgerald & Long Sentry (oder sogar vor seinem Kauf) ist das durchlesen seiner Bedienungsanleitung. Dies sollten wir wegen ein paar einfacher Gründe machen:
Wenn Sie Fitzgerald & Long Sentry noch nicht gekauft haben, ist jetzt ein guter Moment, um sich mit den grundliegenden Daten des Produkts bekannt zu machen. Schauen Sie zuerst die ersten Seiten der Anleitung durch, die Sie oben finden. Dort finden Sie die wichtigsten technischen Daten für Fitzgerald & Long Sentry - auf diese Weise prüfen Sie, ob das Gerät Ihren Wünschen entspricht. Wenn Sie tiefer in die Benutzeranleitung von Fitzgerald & Long Sentry reinschauen, lernen Sie alle zugänglichen Produktfunktionen kennen, sowie erhalten Informationen über die Nutzung. Die Informationen, die Sie über Fitzgerald & Long Sentry erhalten, werden Ihnen bestimmt bei der Kaufentscheidung helfen.
Wenn Sie aber schon Fitzgerald & Long Sentry besitzen, und noch keine Gelegenheit dazu hatten, die Bedienungsanleitung zu lesen, sollten Sie es aufgrund der oben beschriebenen Gründe machen. Sie erfahren dann, ob Sie die zugänglichen Funktionen richtig genutzt haben, aber auch, ob Sie keine Fehler begangen haben, die den Nutzungszeitraum von Fitzgerald & Long Sentry verkürzen könnten.
Jedoch ist die eine der wichtigsten Rollen, die eine Bedienungsanleitung für den Nutzer spielt, die Hilfe bei der Lösung von Problemen mit Fitzgerald & Long Sentry. Sie finden dort fast immer Troubleshooting, also die am häufigsten auftauchenden Störungen und Mängel bei Fitzgerald & Long Sentry gemeinsam mit Hinweisen bezüglich der Arten ihrer Lösung. Sogar wenn es Ihnen nicht gelingen sollte das Problem alleine zu bewältigen, die Anleitung zeigt Ihnen die weitere Vorgehensweise – den Kontakt zur Kundenberatung oder dem naheliegenden Service.