💾 Archived View for gemini.spam.works › mirrors › textfiles › hacking › VMS › tcsb.09 captured on 2022-06-12 at 08:53:15.

View Raw

More Information

-=-=-=-=-=-=-


______________________________________________________________________________

                    Using the VAX/VMS  Authorize Utility
                     Written by Line Shadow on 09/10/88

                  A Telecom Computer Security Bulletin File
                     Volume One, Number 1, File 9 of 12
______________________________________________________________________________


                      Time to play God with your favorite
                          ___ ___ ___ ___ ___ ___ ___
                         |   |   |   |   |   |   |   |
                         | d | i | g | i | t | a | l |
                         |___|___|___|___|___|___|___|

                                VAX/VMS System


   In order to put this article to good use, you will have to acquire a high
priviledged VAX account.  I'm leaving that up to you, as this article is
intended for the more advanced VAX hacker.  You can expect another article
discussing the tricks of the trade as regards getting an account with
priviledges of that sort in future articles.  Until then, you're on your own.

   This is a reference on how to use a powerful utility within VMS that will
allow you to create accounts on a digital VAX system.  This utility, called the
Authorize Utility is located on every VAX system.  It can be found in the
SYS$SYSTEM directory (which is a logical name for SYS$SYSROOT:[SYSEXE]) under
the filename AUTHORIZE.EXE.  This is the actual program and you just RUN it.
Along with tons of other files within SYS$SYSTEM, you will find two other files
that are manipulated by the Authorize Utility.


Quick definitions for the Command Syntax:
===============================================================================

Qualifier -             A qualifier is an optional extension of a main command
                        (discussed below) whose format consists of:
                                 command/qualifier

Use of brackets -       Use of brackets ('[' and ']') placed around a logical-
                        name indicates that the enclosed item is optional.
                        Except in the case of specifying directories which
                        has to have the brackets around the directory name.
                        Also note that parenthesis arounf a logical name are
                        required when noted as such.

file-spec,... -         Indicates that additional parameters, values, or
                        information can be entered.

-------------------------------------------------------------------------------
Command Syntax:  UAF> command [parameter]
===============================================================================

ADD
  /[NO]ACCESS[=(range[,...])]
  /ACCOUNT=account-name
  /[NO]ADD_IDENTIFIER
  /ATTRIBUTES=(keyword[,...])
  /[NO]BATCH[=(range[,...])]
  /BIOLM=value
  /BYTLM=value
  /CLI=cli-name
  /CLITABLES=clitable-name
  /CPUTIME=time
  /DEFPRIVILEGES=([NO]privname[,...])
  /DEVICE=name
  /[NO]DIALUP[=(range[,...])]
  /DIOLM=value
  /DIRECTORY=directory-name
  /ENQLM=value
  /EXPIRATION=time
  /FILLM=value
  /GENERATE_PASSWORD[=keyword]
  /FLAGS=([NO]option[,...])
  /[NO]INTERACTIVE[=(range[,...])]
  /JTQUOTA=value
  /LGICMD=file-spec
  /[NO]LOCAL[=(range[,...])]
  /MAXACCTJOBS=value
  /MAXDETACH=value
  /MAXJOBS=value
  /[NO]NETWORK[=(range[,...])]
  /OWNER=owner-name
  /[NO]PASSWORD=(password[,password2])
  /PFLAGS=([NO]option[,...])
  /PGFLQUOTA=value
  /PRCLM=value
  /P_RESTRICT=(range[,...])
  /PRIMEDAYS=([NO]day[,...])
  /PRIORITY=value
  /PRIVILEGES=([NO]privname[,...])
  /[NO]PWDEXPIRED
  /[NO]PWDLIFETIME=time
  /PWDMINIMUM=value
  /QUEPRIORITY=value
  /[NO]REMOTE[=(range[,...])]
  /SFLAGS=([NO]option[,...])
  /SHRFILLM=value
  /S_RESTRICT=(range[,...])
  /TQELM=value
  /UIC=uic
  /WSDEFAULT=value
  /WSEXTENT=value
  /WSQUOTA=value
ADD/IDENTIFIER
  /ATTRIBUTES=(keyword[,...])
  /USER=user-spec
  /VALUE=value-specifier
ADD/PROXY
COPY
  (Same qualifiers as ADD)
CREATE/PROXY
CREATE/RIGHTS
DEFAULT
  (Same qualifiers as ADD)
EXIT
GRANT/IDENTIFIER
  /ATTRIBUTES=(keyword[,...])
HELP
  (All commands and qualifiers)
LIST
  /BRIEF
  /FULL
LIST/IDENTIFIER
  /BRIEF
  /FULL
  /USER=user-spec
  /VALUE=value-specifier
LIST/PROXY
LIST/RIGHTS
   /USER=user-spec
MODIFY
  /[NO]ACCESS[=(range[,...])]
  /ACCOUNT=account-name
  /ASTLM=value
  /[NO]BATCH[=(range[,...])]
  /BIOLM=value
  /BYTLM=value
  /CLI=cli-name
  /CLITABLES=clitable-name
  /CPUTIME=time
  /DEFPRIVILEGES=([NO]privname[,...])
  /DEVICE=name
  /[NO]DIALUP[=(range[,...])]
  /DIOLM=value
  /DIRECTORY=directory-name
  /ENQLM=value
  /EXPIRATION=time
  /FILLM=value
  /FLAGS=([NO]option[,...])
  /[NO]INTERACTIVE[=(range[,...])]
  /JTQUOTA=value
  /LGICMD=file-spec
  /[NO]LOCAL[=(range[,...])]
  /MAXACCTJOBS=value
  /MAXDETACH=value
  /MAXJOBS=value
  /[NO]MODIFY_IDENTIFIER
  /[NO]NETWORK[=(range[,...])]
  /OWNER=owner-name
  /PASSWORD=(password[,password2])
  /PFLAGS=([NO]option[,...])
  /PGFLQUOTA=value
  /PRCLM=value
  /P_RESTRICT=(range[,...])
  /PRIMEDAYS=([NO]day[,...])
  /PRIORITY=value
  /PRIVILEGES=([NO]privname[,...]!
  /[NO]PWDEXPIRED
  /[NO]PWDLIFETIME=time
  /PWDMINIMUM=value
  /QUEPRIORITY=value
  /[NO]REMOTE[=(range[,...])]
  /SFLAGS=([NO]option[,...])
  /SHRFILLM=value
  /S_RESTRICT=(range[,...])
  /TQELM=value
  /UIC=uic
  /WSDEFAULT=value
  /WSEXTENT=value
  /WSQUOTA=value
MODIFY/IDENTIFIER
  /ATTRIBUTES=(keyword[,...])
  /HOLDER=holder-name
  /NAME=id-name
  /VALUE=value-specifier
MODIFY/SYSTEM_PASSWORD=system-password
REMOVE
  /[NO]REMOVE_IDENTIFIER
REMOVE/PROXY
RENAME
  /PASSWORD[=(password[,password2])]
  /[NO]MODIFY_IDENTIFIER
RENAME/IDENTIFIER
REVOKE/IDENTIFIER
SHOW
  /BRIEF
SHOW/IDENTIFIER
  /BRIEF
  /FULL
  /USER=user-spec
  /VALUE=value-specifier
SHOW/PROXY
SHOW/RIGHTS
  /USER=user-spec
-------------------------------------------------------------------------------
Description:
===============================================================================

   Using Authorize, you control access to the system and its resources by

    o  Creating new records and modifying existing records in the system user
       authorization file (SYS$SYSTEM:SYSUAF.DAT) and the network user
       authorization file (SYS$SYSTEM:NETUAF.DAT)

    o  Creating new records and modifying existing records in the rights
       database file (SYS$SYSTEM:RIGHTSLIST.DAT)

-------------------------------------------------------------------------------
Command Summary:
===============================================================================

ADD
--------------------
 The ADD command will create a new entry in the user authorization file.

 Format for creating new entries in SYSUAF.DAT:

        ADD newusername [/qualifiers]

Qualifiers:
/ACCESS

 /[NO]ACCESS=([PRIMARY], [n-m], [n] [,...] [SECONDARY], [n-m], [n] [,...])
 /[NO]ACCESS="[PRIMARY][:] [n-m][,] [n][,...][;] [SECONDARY][:] [n-m][,...]"

 Used to specify hours of access for all modes of logins.  Specify hours
 as integers from 0 to 23, inclusive. Hours may be specified as single
 hours (n), or as ranges of hours (n-m).  If the ending hour of a range
 is earlier than the starting hour, the range extends from the starting
 hour through midnight to the the ending hour.  The first set of hours
 after the keyword PRIMARY specifies hours on primary days; the second
 set of hours after the keyword SECONDARY specifies hours on secondary
 days.

 All the list elements are optional.  If no hours are specified for a
 day type, access is permitted the entire day.  If only primary hours
 or only secondary hours are given, no access is permitted for secondary
 or primary days, respectively.  If hours are given with no day type, they
 apply to both types of days.

 Negating the qualifier by specifying /NOACCESS=(...) completely inverts
 the sense of the access hours.

 Examples:

 /ACCESS                allows unrestricted access
 /NOACCESS=SECONDARY    allows access on primary days only
 /ACCESS=(9-17)         allows access from 9am through 5 pm on all days
 /NOACCESS=(PRIMARY, 9-17, SECONDARY, 18-8)
                        allows access from 9 through 5 on secondary days
                        and all but 9 through 5 on primary days
 /ACCESS="Primary: 9-16; Secondary: 18-7, 8; Primary: 17"
                        allows access from 9 through 5 on primary days
                        and all but 9 through 5 on secondary days

 To specify access hours for specific types of logins, see the
 /BATCH, /NETWORK, /INTERACTIVE, /LOCAL, /DIALUP, and /REMOTE qualifiers.


/ACCOUNT

 /ACCOUNT=account-name

 Specifies a default account name.  This field is often used for billing
 purposes, and should consist of 1 through 8 characters.


/ADD_IDENTIFIER

 /[NO]ADD_IDENTIFIER

 Controls whether an identifier corresponding to the specified username
 and UIC is added to the rights database.  The default is /ADD_IDENTIFIER.


/ASTLM

 /ASTLM=n

 Specifies the AST queue limit, which is the total number of asynchronous
 system trap operations and scheduled wakeup requests that can be
 outstanding at one time for the user.


/BATCH

 /[NO]BATCH=([PRIMARY], [n-m], [n] [,...] [SECONDARY], [n-m], [n] [,...])
 /[NO]BATCH="[PRIMARY][:] [n-m][,] [n][,...][;] [SECONDARY][:] [n-m][,...]"

 Specifies hours of access permitted for batch jobs. For a detailed
 description of the interpretation of the access specification, see the
 /ACCESS qualifier.


/BIOLM

 /BIOLM=n

 Specifies the total buffered I/O operations that can be outstanding
 at one time.


/BYTLM

 /BYTLM=n

 Total number of bytes that can be specified for transfer in
 outstanding buffered I/O operations.


/CLI

 /CLI=cli-name

 Name of the default command interpreter.


/CLITABLES

 /CLITABLES=table-name

 Name of the default command interpreter tables.


/CPUTIME

 /CPUTIME=delta-time

 Maximum amount of CPU time a user process can take per session.  The
 unit of time must be in delta format.  0 means infinite.


/DEFPRIVILEGES

 /DEFPRIVILEGES=([NO]privname [,...])

 Specifies the default privileges for the user (i.e., those enabled
 at login time).  A NO prefix removes this privilege from the user;
 specifying a privilege without the NO prefix allows the user that
 privilege.

 There are many privileges available with varying degrees of power and
 potential system impact.  Please see the VAX/VMS System Manager's
 Reference Manual for a more detailed discussion of the available
 privileges.


/DEVICE

 /DEVICE=device-name

 Name of default device (must be a direct access device) from one to
 fifteen characters.  The colon is automatically added if omitted.
 A blank device is interpreted as SYS$SYSDISK.


/DIALUP

 /[NO]DIALUP=([PRIMARY], [n-m], [n] [,...] [SECONDARY], [n-m], [n] [,...])
 /[NO]DIALUP="[PRIMARY][:] [n-m][,] [n][,...][;] [SECONDARY][:] [n-m][,...]"

 Specifies hours of access permitted for interactive login via dialup
 terminals.  For a detailed description of the interpretation of the
 access specification, see the /ACCESS qualifier.


/DIOLM

 /DIOLM=n

 Total direct (usually disk) I/O operations that can be outstanding at
 one time.


/DIRECTORY

 /DIRECTORY=directory-name

 Name of default login directory.  Brackets (either [] or <>) must be
 supplied.


/ENQLM

 /ENQLM=n

 Total number of lock requests which may be outstanding at one time.


/EXPIRATION

 /EXPIRATION=time

 Expiration date and time of the account.  Specify as an absolute or
 combination time.


/FILLM

 /FILLM=n

 Total number of files that can be open at one time, including active
 network logical links.


/FLAGS

 /FLAGS=([NO]option[,...])

 Login flags for this user.  Options which may be specified are:

        [NO]AUDIT      - [do not] audit all security relevant actions
        [NO]AUTOLOGIN  - [do not] restrict this account to autologins only
        [NO]CAPTIVE    - [do not] prevent user
        [NO]DEFCLI     - [do not] prevent user from changing default CLI
                                  or CLI tables
        [NO]DISCTLY    - [do not] disable <CTRL/Y> interrupts
        [NO]DISMAIL    - [do not] prevent mail delivery to this user
        [NO]DISNEWMAIL - [do not] suppress "New Mail..." announcements
        [NO]DISRECONNECT-[do not] disable automated reconnections
        [NO]DISREPORT  - [do not] disable time of last login and other
                                  security reports
        [NO]DISUSER    - [do not] disable this account completely
        [NO]DISWELCOME - [do not] suppress "Welcome to..." login message
        [NO]GENPWD     - [do not] require user to use generated passwords
        [NO]LOCKPWD    - [do not] prevent user from changing password
        [NO]PWD_EXPIRED- [do not] mark password as expired
        [NO]PWD2_EXPIRED-[do not] mark second password as expired


/GENERATE

 /GENERATE
 /GENERATE=CURRENT
 /GENERATE=PRIMARY
 /GENERATE=SECONDARY
 /GENERATE=BOTH
 /GENERATE=ALL

 Generate a random password.  The formats of the passwords is the same
 as for the DCL SET PASSWORD /GENERATE command.


/INTERACTIVE

 /[NO]INTERACTIVE=([PRIMARY], [n-m], [n] [,...] [SECONDARY], [n-m], [n] [,...])
 /[NO]INTERACTIVE="[PRIMARY][:] [n-m][,] [n][,...][;] [SECONDARY][:] [n][,...]"

 Specifies hours of access permitted for interactive login via any
 terminal.  For a detailed description of the interpretation of the
 /ACCESS qualifier.

/JTQUOTA

 /JTQUOTA=n

 Specifies the initial byte quota with which the job-wide logical name
 table is to be created with.


/LGICMD

 /LGICMD=filespec

 Name of login command file.  Default device and directory are used to
 locate the command file.


/LOCAL

 /[NO]LOCAL=([PRIMARY], [n-m], [n] [,...] [SECONDARY], [n-m], [n] [,...])
 /[NO]LOCAL="[PRIMARY][:] [n-m][,] [n][,...][;] [SECONDARY][:] [n-m][,...]"

 Specifies hours of access permitted for interactive login via local
 terminals.  For a detailed description of the interpretation of the
 access specification, see the /ACCESS qualifier.


/MAXACCTJOBS

 /MAXACCTJOBS=n

 Interactive and detached processes
 which may be active at one time for all users which are on the same
 account as the user for which the qualifier is present.


/MAXDETACH

 /MAXDETACH=n

 Specifies the maximum number of detached processes with this username
 that may be active at one time.  Processes which cause this count to
 be exceeded are terminated.


/MAXJOBS

 /MAXJOBS=n

 Maximum number of interactive, batch, and detached processes with this
 username which can be active at one time.  Processes which cause this
 count to be exceeded are terminated.


/NETWORK

 /[NO]NETWORK=([PRIMARY], [n-m], [n] [,...] [SECONDARY], [n-m], [n] [,...])
 /[NO]NETWORK="[PRIMARY][:] [n-m][,] [n][,...][;] [SECONDARY][:] [n-m][,...]"

 Specifies hours of access permitted for network jobs.  For a detailed
 description of the interpretation of the access specification, see the
 /ACCESS qualifier.


/OWNER

 /OWNER=owner-name

 Name of owner for billing purposes, etc.  May be from one to 31 characters.


/PASSWORD

 /PASSWORD=(password [,password2])
 /NOPASSWORD

 Password(s) for login.  Must be from 0 to 31 characters in length, and
 must be composed of alphanumeric characters, dollar signs, and underscores.

 To set the first password with no second password, specify

            /PASSWORD=password

 To set both passwords, specify

            /PASSWORD=(password, password2)

 To set only the first password leaving the second alone, specify

            /PASSWORD=(password, "")

 To set only the second password leaving the first alone, specify

            /PASSWORD=("", password2)

 To clear the second password leaving the first alone, specify

            /PASSWORD=""

 To clear both passwords, specify

            /NOPASSWORD


/PBYTLM

 /PBYTLM=n

 Paged pool byte count limit.


/PFLAGS

 /PFLAGS=([NO]option[,...])

 This qualifier is obsolete and is retained for compatibility purposes.
 For current usage, see the /ACCESS, etc., qualifiers.
 Login flags for primary days.  Options are:

        [NO]DISDIALUP   - [do not] prohibit user from dialing in
        [NO]DISNETWORK  - [do not] prohibit user from logging in via a
                                        "SET HOST" command.


/PGFLQUOTA

 /PGFLQUOTA=n

 Total pages that this process can use in the system paging file.  Should
 be a minimum of 2048 for a typical interactive process.


/P_RESTRICT

 /P_RESTRICT=(n-m[,...])

      or

 /P_RESTRICT=(n[,...])

 This qualifier is obsolete and is retained for compatibility purposes.
 For current usage, see the /ACCESS, etc., qualifiers.
 Used to specify hours or ranges of hours to restrict user from logging in on
 primary days.

 /P_RESTRICT=(...) is roughly equivale7t to /NOACCESS=(PRIMARY, ...)



/PRCLM

 /PRCLM=n

 Total number of subprocesses that can exist at one time.


/PRIMEDAYS

 /PRIMEDAYS=([NO]day[,...])

 Used to define primary and secondary days.  A day prefixed with NO becomes
 a secondary day, and a day without the NO prefix is defined as a primary
 day.  Primary and secondary day definitions are used in conjunction with
 the /ACCESS, etc., qualifiers.


/PRIORITY

 /PRIORITY=n

 Default base priority for user.  The priority should be in the range from
 0 - 31, and 4 is the default for a timesharing user.


/PRIVILEGES

 /PRIVILEGES=([NO]privname[,...])

 Specifies authorized privileges for this user.  Privileges which are
 allowed or disallowed for this user.  A NO prefix removes this privalege
 from the user; specifying a privilege without the NO prefix allows the
 user that privilege.

 There are many privileges available with varying degrees of power and
 potential system impact.  I will make up a list of the priviledges in a
 future article, until then...set them to ALL!  Heheh...


/PWDEXPIRED

 /[NO]PWDEXPIRED

 Password is [not] pre-expired.  When a password is pre-expired, the
 user is allowed to log in once, at which time he must change his
 password or be locked out of the system.


/PWDLIFETIME

 /PWDLIFETIME=delta-time
 /PWDLIFETIME=NONE

 Password lifetime.  If the date of last password change is older than
 the password lifetime, when the user logs in, he is issued a warning
 message and the password is marked as expired.  If there is no password
 lifetime, the password never expires.

 Delta-time is in the form: [dddd-] [hh:mm:ss.cc]


/PWDMINIMUM

 /PWDMINIMUM=n

 Minimum password length in characters.  Note that this value is only
 enforced by the SET PASSWORD command; passwords in violation of this
 value may be specified to AUTHORIZE.


/QUEPRIORITY

 /QUEPRIORITY=n

 Maximum priority for queuing batch and print jobs.  The priority should
 be in the range from 0 - 31, and 4 is the default value for a
 timesharing user.


/REMOTE

 /[NO]REMOTE=([PRIMARY], [n-m], [n] [,...] [SECONDARY], [n-m], [n] [,...])
 /[NO]REMOTE="[PRIMARY][:] [n-m][,] [n][,...][;] [SECONDARY][:] [n-m][,...]"

 Specifies hours of access permitted for interactive login via network
 remote terminals (i.e., SET HOST).  For a detailed description of the
 interpretation of the access specification, see the /ACCESS qualifier.


/SFLAGS

 /SFLAGS=([NO]option[,...])

 This qualifier is obsolete and is retained for compatibility purposes.
 For current usage, see the /ACCESS, etc., qualifiers.
 Login flags for secondary days.  Options are:

        [NO]DISDIALUP   - [do not] prohibit user from dialing in
        [NO]DISNETWORK  - [do not] prohibit user from logging in via a
                                        "SET HOST" command.


/S_RESTRICT

 /S_RESTRICT=(n-m[,...])

      or

 /S_RESTRICT=(n[,...])

 This qualifier is obsolete and is retained for compatibility purposes.
 For current usage, see the /ACCESS, etc., qualifiers.
 Used to specify hours or ranges of hours to restrict user from logging in on
 secondary days.

 /S_RESTRICT=(...) is roughly equivalent to /NOACCESS=(SECONDARY, ...)


/SHRFILLM

 /SHRFILLM=n

 Maximum number of shared files allowed to be open at one time.


/TQELM

 /TQELM=n

 Total entries in the timer queue plus the number of temporary common
 event flag clusters that the user can have at one time.


/UIC

 /UIC=uic

 User identification code as explained in the VAX/VMS System Manager's
 Reference Manual.  The UIC should have an octal group number and user
 number, and be separated by a comma and enclosed in brackets.


/WSDEFAULT

 /WSDEFAULT=n

 Initial limit of a working set for the user process.


/WSEXTENT

 /WSEXTENT=n

 Maximum to which the user's process may raise its working set limit
 when there is free memory available.


/WSQUOTA

 /WSQUOTA=n

 Maximum to which the user's process may raise the working set limit
 when system memory is in demand.



ADD/IDENTIFIER
--------------------
 The ADD/IDENTIFIER command is used to add an identifier to the rights
 database.

 Format:

        ADD/IDENTIFIER  [id-name]

 Parameters:
  id-name

  specifies the name of the identifier to be added to the rights
  database.  If you omit the name, you must specify the /USER
  qualifier. The id-name is a string of 1 through 32
  alphanumeric characters that may contain underscores and dollar
  signs.  The name must contain at  least one non-numeric
  character.

  Qualifiers:
  /ATTRIBUTES

   /ATTRIBUTES=(keyword)

   Specifies attributes to be associated with the new identifier.
   Valid keywords are:

  [NO]DYNAMIC   Indicates whether or not unprivileged holders of the
                identifier may add or remove the identifier from the
                process rights list.  The default is NODYNAMIC.

  [NO]RESOURCE  Indicates whether or not holders of the identifier
                may charge resources to it.  The default is NORESOURCE.


/USER

 /USER=user-spec

 Scans the UAF record(s) of the specified user(s) and creates
 the appropriate identifiers(s).  Specify user-spec by username
 or UIC.  You can user the  asterisk wildcard to specify multiple
 usernames or UICs:  full user of the  asterisk and percent
 wildcards is permitted for user names; UICs must be in the form
 [*,*], [n,*], [*,n], or [n,n].  A wildcard username
 specification (i.e., *) creates identifiers alphabetically by
 username; a wildcard UIC  specification (i.e., [*,*]) creates
 them in numerical order by UIC.


/VALUE

 /VALUE=value-specifier

 Specifies the value to be attached to the identifier.  Valid formats
 for the value-specifier are:

 IDENTIFIER:integer             An integer value in the range of
                                32768 to 268435455, or a
                                hexadecimal number in the range
                                %X00008000 to 0FFFFFF

 UIC:uic                        A uic value in the standard UIC
                                format

 Examples:

         The following examples illustrate the use of the ADD/IDENTIFIER
         command.

  1. UAF> ADD/IDENTIFIER/VALUE=UIC:[300,011] INVENTORY
     identifier INVENTORY value: [000300,000011] added to RIGHTSLIST.DAT

        This command adds to the rights database an identifier named
        INVENTORY.  By default, the identifier is not marked as a
        resource.

   2. UAF> ADD/IDENTIFIER/ATTRIBUTES=(RESOURCE) -
      /VALUE=IDENTIFIER:%X80011 PAYROLL
      identifier PAYROLL value: %X80080011 added to RIGHTSLIST.DAT

        This command adds the identifier PAYROLL and marks it as a
        resource.


ADD/PROXY
  Adds a user record to the network UAF.

  Format

        ADD/PROXY node::remote-user local-user

 Parameters:
 node

 specifies a node name (1 through 6 alphanumberic characters).

 remote-user

 specifies the username of a user at a remote node.  If you
 specify an asterisk, all users at the specified node can access
 files of a user specified on the local node.

 local-user

 specifies the username of a user on a local node.

 Examples:

 1. UAF> ADD/PROXY MISHA::MARCO *
    record successfully added NETUAF.DAT

        The command in this example specifies that the user MARCO on
        the remote node MISHA can only access the files of MARCO on the
        local node.

 2. UAF> ADD/PROXY MISHA::* MARCO
    record successfully added to NETUAF.DAT

        The command in this example specifies that any user on the
        remote node MISHA can access the files of MARCO on the local
        node.

 Parameters:
 newusername

 "newusername" specifies the name of the user to be added to the user
 authorization file.



COPY
--------------------
 The COPY command is used to make a copy of a record in SYSUAF.DAT.  The
 full range of qualifiers is available for the command in order to
 change certain fields in the process of the copy operation.

 Format:

        COPY existing-username new-username [/qualifiers]

 Parameters:
 existing-username new-username

 existing-username is the source authorization record;
 new-username is the destination authorization record.

 Qualifiers:
    (Same qualifiers as ADD)



CREATE
--------------------
 This command will create a Proxy Login File (NETUAF.DAT) if one does
 not already exist or the rights database (RIGHTSLIST.DAT).

 Qualifiers:
/PROXY
 Creates and initializes a network UAF, NETUAF.DAT.  The /PROXY
 qualifier is required.  The file is created with no records and
 is assigned the following protection:

        (S:RWED,O:RWED,G:RWE,W)


/RIGHTS
 Creates and initializes the rights database, RIGHTSLIST.DAT,
 If it does not already exist.  The file is created with no
 records and is assigned the following protection:

        (S:RWED,0:RWED,G:RWE,W)

 Format

        CREATE/RIGHTS

 Qualifiers: Format CREAT/(PROXY or RIGHTS)/qualifier
/SYSTEM_ID=(integer list)
 Specifies the system ID quadword.  Only the first two integers
 are used.  The first integer becomes the first longword of the
 system ID, and the second integer the second longword.  If only
 one integer is specified, the second longword is set to 0.

DEFAULT
--------------------
 This command enables the user to change any field(s) in the DEFAULT
 record in SYSUAF.DAT.

 Format:

        DEFAULT /qualifier [/qualifiers]

 Qualifiers:
    (Same qualifiers as ADD)



EXIT
--------------------
 The EXIT command terminates AUTHORIZE and returns the user to command
 language level.

 Format:

        EXIT



GRANT
--------------------
 The GRANT command grants an identifier name to a user UIC.  The
 /IDENTIFIER is required.

 Format

        GRANT/IDENTIFIER id-name user-spec

 Parameters:
 id-name

 Specifies the identifier name (see the ADD/IDENTIFIER command).

 user-spec

 Is an identifier (UIC or non UIC format) that specifies the
 user (see the ADD/IDENTIFIER command).

 Qualifier:

/ATTRIBUTES

 /ATTRIBUTES=(keyword)

 See the ADD/IDENTIFIER command.

 Example:
 UAF> GRANT/IDENTIFIER INVENTORY [300,015]
 identifier INVENTORY granted to CRAMER

        The command in this example grants the identifier INVENTORY to
        a user with the UIC [300,015].  The user becomes the holder of
        the identifier and any resources associated with it.



HELP
--------------------
 Lists and explains the AUTHORIZE commands and qualifiers.

 Format

        HELP [commmand-name]

 Parameter:
 command-name

 Name of an AUTHORIZE command.

 Qualifier:
 qualifier-name

 Name of an AUTHORIZE qualifier



LIST
--------------------
 The LIST command outputs a listing file which gives information
 on the records specified. Unless otherwise specified by
 qualifiers, UAF records are listed.

 Qualifiers:
/BRIEF
 This qualifier will give an abbreviated listing of the desired record(s).
 /BRIEF is equivalent to /NOFULL.


/FULL
 This qualifier gives complete information on the desired record(s).
 /FULL is equivalent to /NOBRIEF. /FULL is the default.

LIST/IDENTIFIER
--------------------
 Creates a listing file (RIGHTLIST.LIS) to which identifier
 information is written.

 Format

        LIST/IDENTIFIER [id-name]

 Parameter:
 id-name

 Specifies an identifier name.  If you omit the identifier name,
 you must specify /USER or /VALUE.

 Qualifiers:
/USER
 /USER=user-spec

 Specifies one or more users whose identifiers are to be listed.
 User-spec may be a username or UIC.  You can user the asterisk
 wildcard to specify multiple usernames or UICs:  full use of
 the asterisk and percent wildcards is permitted for usernames;
 UICs must be in the form [*,*], [*,n], or [n,*].  A
 wildcard username specification (i.e., *) lists identifiers
 alphabetically by username; a wildcard UIC specification (i.e.,
 [*,*]) lists them numerically by UIC.


/VALUE
 /VALUE=value-specifier

 Specifies the value of the identifier to be listed.  Valid
 formats for the value-specifier are:

   IDENTIFIER:integer   An integer value in the range of
                        32768 to 268435455, or a
                        hexadecimal number in the range
                        %X00008000 to 0FFFFFFF

   UIC:uic              A uic value in the standard UIC
                        format

 Examples:

 UAF> LIST/IDENTIFIER INVENTORY
 writing listing file
 listing file RIGHTSLIST.LIS complete

        The command in this example generates a full listing for the
        identifier INVENTORY, including its value (in hexadecimal),
        holders, and attributes.

 UAF> LIST/IDENTIFIER/USER=ANDERSON
 writing listing file
 listing file SYSUAF.LIS complete

        This command lists an identifier associated with the user
        ANDERSON, along with its value and attributes.  Note, however,
        that this is the same result you would produce had you
        specified ANDERSON's UIC with the following forms of the
        command:

                UAF> LIST/IDENTIFIER/USER=[300,015]

        or

                UAF> LIST/IDENTIFIER/VALUE=UIC:[300,015]

LIST/PROXY
--------------------
 Creates a listing file of all the network UAF records.  The
 /PROXY qualifier is required.

 Format

        LIST/PROXY

 Example:

 UAF> LIST/PROXY
 writing listing file
 listing file NETUAF.LIS complete

        The command in this example creates a listing file of all the
        network UAF records.



LIST/RIGHTS
--------------------
 Lists the holders of the specified identifier, or, if /USER is
 specified, all identifiers held by the specified user(s).

 Format

        LIST/RIGHTS [id-name]

 Parameter:
 id-name

 This is the name of the identifier (usually the username) associated
 with the user.  If id-name is omitted, you must specify the
 /USER qualifier.

 Qualifier:
/USER
 /USER=user-spec

 Specifies a user whose identifiers are to be listed.  User-spec
 may be a username or UIC.  You can use the asterisk wildcard to
 specify multiple usernames or UICs:  full user of the asterisk
 and percent wildcards is permitted for usernames; UICs must be
 in the form [*,*], [n,*], [n,n] or [*,n].  A wildcard username
 specification (i.e., *) or wildcard UIC specification (i.e.,
 [*,*]) lists all identifiers held by users.  The wildcard
 username specification lists holders' usernames alphabetically;
 the wildcard UIC specification lists them in the numerical
 order of their UICs.

 Example:
 UAF> LIST/RIGHTS PAYROLL
 writing listing file
 listing file RIGHTSLIST.LIS is complete

        The command is this example creates a listing file of all
        holders of the identifier PAYROLL.



MODIFY
--------------------
 This command allows the user to change any field(s) in any user authorization
 record(s).  Wildcarding of usernames or UICs is allowed.

 Format:

        MODIFY user-spec /qualifier [/qualifiers]

 Qualifier's:
   The MODIFY qualifiers are very similar to the ADD qualifiers with the
 following exceptions:

 /[NO]MODIFY_IDENTIFIER rather than /[NO]ADD_IDENTIFIER with the same
  parameters


 /ASTLM
  /ASTLM=value

 Specifies the AST queue limit, which is the total number of asynchronous
 system trap operations and scheduled wakeup requests that can be
 outstanding at one time for the user.



MODIFY/IDENTIFIER
--------------------
 Modifies an identifier in the rights database.

 Format

        MODIFY/IDENTIFIER id-name

 Parameter:
 id-name

 Specifies the name of an identifier to be modified

 Qualifiers:
/ATTRIBUTES

 /ATTRIBUTES=(keyword)

 Specifies attributes to be associated with the modified
 identifier.  Valid keywords are:

 [NO]DYNAMIC    Indicates whether or not unprivileged holders of the
                identifier may add or remove the identifier from the
                process rights list.  The default is NODYNAMIC.

 [NO]RESOURCE   Indicates whether or not holders of the identifier
                may charge resources to it.  The default is NORESOURCE.

 If you specify RESOURCE, a holder named with the /HOLDER
 qualifier gains the right to charge resources to the
 identifier.  If you specify /NORESOURCE, the holder loses the
 right to charge resources.  If you specify NORESOURCE and do
 not name any holder (if /HOLDER is not specified), all holders
 lose the right to charge resources.


/HOLDER

 /HOLDER=username

 Specifies the holder of an identifier whose attributes are to
 modified.  /HOLDER is used only in conjunction with
 /ATTRIBUTES qualifier.  If you specify /HOLDER, the /NAME and
 /VALUE qualifiers are ignored.


/NAME

 /NAME=id-name

 Specifies a new id-name to be associated with the identifier.


/VALUE

 /VALUE=value-specifier

 Specifies a new identifier value.  Note, however, that an
 identifier value cannot be modified from a UIC to a non UIC
 format or vice versa.  Valid formats for the value-specifier
 are:

   IDENTIFIER:integer   An integer value in the range of
                        32768 to 268435455, or a
                        hexadecimal number in the range
                        %X00008000 to 0FFFFFFF

   UIC:uic              A uic value in the standard UIC
                        format

 Examples:
 UAF> MODIFY/IDENTIFIER/VALUE=UIC:[300,21] ACCOUNTING
 identifier ACCOUNTING modified

        The command in this example changes the old UIC value of the
        identifier ACCOUNTING to a new value.

 UAF> MODIFY/IDENTIFIER/ATTRIBUTES=NORESOURCE/HOLDER=ALLISON ACCOUNTING
 identifier ACCOUNTING modified

        The command in this example associates the attribute NORESOURCE
        with the identifier ACCOUNTING in ALLISON's holder record.



MODIFY/SYSTEM_PASSWORD
 Sets the system password.

 Format

        MODIFY/SYSTEM_PASSWORD=system-password

 Parameters:
 user-spec

 The record(s) to be modified may be specified in a variety of ways:

        1) wildcarded username (standard DCL wildcarding)
        2) wildcarded UIC, as
                a) [*,*]
                b) [*,n]
                c) [n,*]
        3) specific username
        4) specific UIC



REMOVE
--------------------
 This command will remove a user authorization record from SYSUAF.DAT.

 Format for removing a record from SYSUAF.DAT:

        REMOVE username

 Parameters:
 username

 username is the name of the authorization record to be removed from
 SYSUAF.DAT.

Qualifiers:
/REMOVE_IDENTIFIER

 /[NO]REMOVE_IDENTIFIER

 Controls whether the identifier corresponding to the specified username
 in the rights database is removed.  The default is /REMOVE_IDENTIFIER.



REMOVE/IDENTIFIER
--------------------
 Removes an identifier from the rights database.

 Format

  REMOVE/IDENTIFIER id-name

 Parameter:
  id-name

  Specifies the name of an identifier in the rights database.

 Example:
  UAF> REMOVE/IDENTIFIER Q1SALES
  record removed from RIGHTSLIST.DAT

        The command in this example deletes the identifier Q1SALES from
        the rights database.



REMOVE/PROXY
--------------------
 This qualifier changes the context of REMOVE command.  Its presence
 indicates that the intention is to remove a record from the Proxy
 Login File,  NETUAF.DAT.  The format for removing a record from
 NETUAF.DAT is

        REMOVE/PROXY node::remoteusername

 where "node::remoteusername" is an entry in NETUAF.DAT for the local node.


RENAME
 This command will change the username for a record in the user authorization
 file, SYSUAF.DAT.  The only parameter qualifier allowed for the RENAME
 command is the /PASSWORD qualifier.


 Format:

        RENAME old-username new-username [/PASSWORD=password]

 Qualifiers:
/GENERATE

 /GENERATE
 /GENERATE=CURRENT
 /GENERATE=PRIMARY
 /GENERATE=SECONDARY
 /GENERATE=BOTH
 /GENERATE=ALL

 Generate a random password.  The formats of the passwords is the same
 as for the DCL SET PASSWORD /GENERATE command.

/MODIFY_IDENTIFIER

 /[NO]MODIFY_IDENTIFIER

 Controls whether the identifier corresponding to the specified username
 in the rights database is modified.  The default is /MODIFY_IDENTIFIER.

/PASSWORD

 /PASSWORD=(password [,password2])
 /NOPASSWORD

 Password(s) for login.  Must be from 0 to 31 characters in length, and
 must be composed of alphanumeric characters, dollar signs, and underscores.

 To set the first password with no second password, specify

            /PASSWORD=password

 To set both passwords, specify

            /PASSWORD=(password, password2)

 To set only the first password leaving the second alone, specify

            /PASSWORD=(password, "")

 To set only the second password leaving the first alone, specify

            /PASSWORD=("", password2)

 To clear the second password leaving the first alone, specify

            /PASSWORD=""

 To clear both passwords, specify

            /NOPASSWORD

 It is important to specify new passwords for a renamed record.  Since
 the user name is taken as part of the input for password verification,
 the old password with the new user name will not yield the same result
 as the original password and user name, and the verification will fail.



RENAME/IDENTIFIER
--------------------
 Renames an identifier in the rights database.

 Format

        RENAME/IDENTIFIER old-id-name new-id-name

 Parameters:
 old-id-name

 Specifies the name of an identifier to be renamed.

 new-id-name

 Specifies the new identifier name.

 Example:

 UAF> RENAME/IDENTIFIER Q1SALES Q2SALES
 identifier Q1SALES renamed

        The command in this example renames the identifier Q1SALES to
        Q2SALES.


Parameters
 old-username new-username

 "old-username" is the username for the authorization record which is to
 be renamed.  "new-username" is the new username for the record.



REVOKE
--------------------
 Revokes an identifier name from a username or UIC identifier.
 The /IDENTIFIER qualifier is required.

 Format

        REVOKE/IDENTIFIER id-name user-spec

 Parameters:
 id-name

 Specifies the identifier name (see the ADD/IDENTIFIER command).

 user-spec

 Is an identifier (UIC or non UIC format) that specifies the
 user (see the ADD/IDENTIFIER command).



SHOW
--------------------
 The SHOW command outputs a listing of the specified
 authorization record(s) to the user's terminal. Unless otherwise
 specified by qualifiers, UAF records are listed.

 Format for the authorization file:

        SHOW [/qualifiers] user-spec

 Qualifiers:
/BRIEF
 This qualifier will give an abbreviated listing of the desired record(s).
 /BRIEF is equivalent to /NOFULL. /BRIEF is the default.

/FULL
 This qualifier gives complete information on the desired record(s).
 /FULL is equivalent to /NOBRIEF.



SHOW/IDENTIFIER
--------------------
 Displays information about the identifier on the current
 SYS$OUTPUT device.

 Format

        SHOW/IDENTIFIER [id-name]

 Parameter:
 id-name

 Specifies an identifier name.  If you omit the identifier name,
 you must specify /USER or /VALUE.

 Qualifiers:
/BRIEF
 This qualifier will give an abbreviated listing of the desired record(s).
 /BRIEF is equivalent to /NOFULL. /BRIEF is the default.


/FULL
 This qualifier gives complete information on the desired record(s).
 /FULL is equivalent to /NOBRIEF.
/USER


 /USER=user-spec

 Specifies one or more users whose identifiers are to be
 displayed.  User-spec may be XH].+++lKU%9@You can use
 the asterisk wildcard to specify multiple usernames or UICs:
 full use of the asterisk and percent wildcards is permitted for
 usernames; UICs must be in the form [*,*], [*,n], [n,*], or
 [n,n].  A wildcard username specification (i.e., *) displays
 identifiers alphabetically by username; a wildcard UIC
 specification (i.e., [*,*]) displays them numerically by UIC.


/VALUE
 /VALUE=value-specifier

 Specifies the value of the identifier to be listed.  Valid
 formats for the value-specifier are:

   IDENTIFIER:integer   An integer value in the range of
                        32768 to 268435455, or a
                        hexadecimal number in the range
                        %X00008000 to 0FFFFFFF

   UIC:uic              A uic value in the standard UIC
                        format

SHOW/PROXY
 Displays one or all records in the network UAF.  The /PROXY
 qualifier is required.

 Format

        SHOW/PROXY node::remote-user

 Parameters:
 node

 Specifies the name of a network node in the network UAF.  The
 asterisk wildcard is permitted in the node specification.

 remote-user

 Specifies the name of a user on a remote node.  The asterisk
 wildcard is permitted in the remote-user specification.

SHOW/RIGHTS
 Displays the names, values, and attributes of all identifiers
 held by the specified user(s).

 Format

        SHOW/RIGHTS [user-spec]

 Parameter:
 user-spec

 Is the name of the identifier (usually the username) associated
 with the user in SYSUAF.DAT.  If user-spec is omitted, you must
 specify the /USER qualifier.

 Qualifier:
/USER

 /USER=user-spec

 Specifies one or more users whose identifiers are to be
 displayed.  User-spec may be a username or UIC.  You can use
 the asterisk wildcard to specify multiple usernames or UICs:
 full use of the asterisk and percent wildcards is permitted for
 usernames; UICs must be in the form [*,*], [*,n], [n,*], or
 [n,n].  A wildcard username specification (i.e., *) displays
 identifiers alphabetically by username; a wildcard UIC
 specification (i.e., [*,*]) displays them numerically by UIC.


 Parameters:

 If a listing is generated from SYSUAF.DAT, then the user may specify
 "user-spec" in a variety of ways:

        1) wildcarded username (standard DCL wildcarding)

        2) wildcarded UIC, as
                a) [*,*]
                b) [*,n]
                c) [n,*]
        3) specific username
        4) specific UIC.


   Phew!  After all that, you should be doing just fine using the Authorize
Utility.  You can expect summaries of VMS commands, DCL, and other VAX infor-
mation in future articles.  Now, happy hacking and go play God for a while!

______________________________________________________________________________
$