
Configuring Online Security Using the Online Manager
2-8 User Reference
To access the security system from the Primary Option Menu, type SECURITY at the
command line and press ENTER, or select the SYSTEM option to display the System
Configuration Menu. To access the security system from the System Configuration Menu,
select the SECURITY option.
The Secured Users panel displays the names of security profiles that are defined to Online
Manager. Users authorized to do so can use the Secured Users panel to create, modify, and
model security profiles.
TSIO0800.T ----------- BIM-EPIC - Secured Users ---------------- USER=TR91
COMMAND ===>
User ID (MODEL) User ID (MODEL) User ID (MODEL)
_ $DEFSEC _ $EPIC _ SJA $EPIC
L = Delete M = Model U = Update
F1=Help F3=Return F5=Recall F6=Add F12=Exit
The $DEFSEC profile is supplied unsecured and always acts as the default security profile for
all unsecured users, so that the security administrator does not have to define a profile for
every user. To prevent unauthorized access to Online Manager, $DEFSEC cannot be used as
a user ID even if left unsecured. If Bypass the BIM-EPIC Sign–On Panel is set to ‘N’ in
$DEFSEC, all unsecured users will be locked out of Online Manager unless they know a
secured ID and password.
$EPIC is an unmodifiable, unsecured profile that is supplied for use as a model. After
$DEFSEC has been secured, you can grant total system access to selected users by modeling
their user IDs after $EPIC. Users modeled on $EPIC can themselves be modified to create
customized security profiles, as with any other model. To prevent unauthorized access to
Online Manager, $EPIC cannot be used as a user ID. Use caution when modeling user
profiles after $EPIC and leaving them unmodified, because whoever learns one such profile
name could use the Sign–On panel to gain total system access!
To create a brand new Secured User, use an existing security profile as the initial model.
Accessing the
Online Security
System
Secured Users
Panel
Default Security
Profile ($DEFSEC)
The $EPIC Security
Profile
Creating a New
User Security
Profile
Comentarios a estos manuales