Table Of Contents
USING THIS GUIDE---------------------------------------------------------------------------------------- Intro - 1
USING THE SCREENS ------------------------------------------------------------------------------------ Intro - 3
INSTALLING SENTRY------------------------------------------------------------------------------------ Intro - 5
GETTING STARTED--------------------------------------------------------------------------------------- Intro - 8
INTRODUCING THE MAIN MENU ------------------------------------------------------------------Intro - 12
1. INTRODUCING THE DATABASE CREATION AND VALIDATION MENU----------- 1 - 1
1.0 DATABASE CREATION AND VALUDATION MENU------------------------------------------- 1 - 2
1.1 UPLOAD USER AND GROUP PROFILES FROM UNIX----------------------------------------- 1 - 4
1.2 CREATE DATABASE FROM FILE SYSTEM ------------------------------------------------------ 1 - 6
1.3 VALIDATE THE USER PROFILE DATABASE ---------------------------------------------------- 1 - 7
2. INTRODUCING THE DATABASE MAINTENANCE MENU-------------------------------- 2 - 1
2.0 DATABASE MAINTENANCE-------------------------------------------------------------------------- 2 - 2
2.1 SYSTEM PROFILE MAINTENANCE ---------------------------------------------------------------- 2 - 4
2.2 USER MAINTENANCE---------------------------------------------------------------------------------2 - 10
2.3 GROUP MAINTENANCE-------------------------------------------------------------------------------2 - 18
2.4 FILE SYSTEM---------------------------------------------------------------------------------------------2 - 23
ACLs Maintenance-------------------------------------------------------------------------------------------2 - 28
More File Manager Views ----------------------------------------------------------------------------------2 - 31
2.5 COMMAND MAINTENANCE-------------------------------------------------------------------------2 - 34
2.6 USER ITEM PROTECTION MAINTENANCE-----------------------------------------------------2 - 38
3. INTRODUCING THE REPORTS MENU -------------------------------------------------------------- 3 - 1
3.0 REPORTS MENU------------------------------------------------------------------------------------------ 3 - 2
3.1 SYSTEM PROFILE REPORT--------------------------------------------------------------------------- 3 - 4
3.2 USER PROFILES ------------------------------------------------------------------------------------------ 3 - 9
3.3 GROUPS REPORT ---------------------------------------------------------------------------------------3 - 11
3.4 ACCOUNT PROTECTION REPORT-----------------------------------------------------------------3 - 13
3.5 COMMAND PROTECTION REPORT---------------------------------------------------------------3 - 15
3.6 ACCESS VIOLATIONS REPORT---------------------------------------------------------------------3 - 17
4. INTRODUCING THE UTILITIES MENU------------------------------------------------------------- 4 - 1
4.0 UTILITIES MENU----------------------------------------------------------------------------------------- 4 - 2
4.1 VOC PROTECTION SETUP ---------------------------------------------------------------------------- 4 - 4
4.2 PUGING THE VIOLATIONS LOG -------------------------------------------------------------------- 4 - 5
4.3 PASSWORD CREATION-------------------------------------------------------------------------------- 4 - 7
4.4 REBUILD CROSS REFERENCE FILES-------------------------------------------------------------4 - 10
4.5 UPDATE PROTECTED COMMANDS---------------------------------------------------------------4 - 11
APPENDIX 1 ---------------------------------------------------------------------------------------------Appendix - 1
SENTRY INTERNAL SUBROUTINES----------------------------------------------------------- Appendix - 1
Subroutine: SENTRY.ENCRYPT------------------------------------------------------------------ Appendix - 1
DATA ENCRYPTION------------------------------------------------------------------------------- Appendix - 2
Subroutine: SENTRY.USER.ITEM.CONTROL------------------------------------------------- Appendix - 3
Subroutine: SENTRY.VIOLATION.STAMP----------------------------------------------------- Appendix - 6
APPENDIX 2 ------------------------------------------------------------------------------------------ Appendix 2 - 1
SENTRY KEY BINDINGS ------------------------------------------------------------------------Appendix 2 - 1