Module 4 — User & Security Administration
Overview
This module covers OpenVMS user account management, privileges, rights identifiers, ACLs, and system security controls. You’ll work with the UAF, manage user environments, inspect privileges, and diagnose access issues.
Exam: Multiple‑Choice Questions
1. Which command displays information about a user account?
2. Which utility is used to create and modify OpenVMS user accounts?
3. Which privilege allows a user to execute code in kernel mode?
4. Which command displays rights identifiers for a user?
5. Which command displays the Access Control List (ACL) for a file?
Hands‑On Exercises
Exercise 1 — Inspect User Accounts
- Display your own UAF entry:
SHOW USER - Display another user’s entry (requires privileges):
SHOW USER <username> - Identify:
- Default directory
- Privileges
- Login flags
- Password lifetime
Exercise 2 — Create and Modify User Accounts
- Enter AUTHORIZE:
RUN SYS$SYSTEM:AUTHORIZE - Create a new user:
ADD TESTUSER /PASSWORD=Test123 /DEVICE=DKA0: /DIRECTORY=[TESTUSER] - Grant a privilege:
MODIFY TESTUSER /PRIVILEGES=OPER - Exit AUTHORIZE:
EXIT
Exercise 3 — Manage Rights Identifiers
- Display all identifiers:
SHOW RIGHTS - Grant an identifier (privileged):
GRANT/IDENTIFIER ENGINEERS TESTUSER - Verify:
SHOW PROCESS/RIGHTS
Exercise 4 — Work with ACLs
- Display ACL for a file:
SHOW FILE/ACL filename.ext - Add an ACL entry:
SET SECURITY/ACL=(IDENTIFIER=ENGINEERS,ACCESS=READ+WRITE) filename.ext - Verify the ACL again.
Exercise 5 — Diagnose Login Problems
- Check login flags:
SHOW USER <username> - Check password expiration:
SHOW USER/FULL <username> - Check disk quota:
SHOW QUOTA/USER=<username>
Scenario‑Based Troubleshooting Challenges
Scenario 1 — User Cannot Log In
A user reports: “Login incorrect” even though the password is correct.
Expected approach:
- Check login flags (DISUSER, CAPTIVE, RESTRICTED)
- Check password expiration
- Check UIC and directory existence
- Check quota
Scenario 2 — Access Denied to a Shared File
A user cannot access a shared file despite having READ privilege.
Expected approach:
- Check ACL
- Check file protection mask
- Check rights identifiers
- Check group and system protections
Scenario 3 — Privilege Escalation Request
A developer requests SYSPRV “to make things easier.”
Expected approach:
- Evaluate least privilege
- Consider granting a rights identifier instead
- Review audit logs
- Document justification
Answer Key
The answer key for this module is located at:
answers/module4-answers.md