[Search for users] [Overall Top Noters] [List of all Conferences] [Download this site]

Conference iosg::all-in-1_v30

Title:*OLD* ALL-IN-1 (tm) Support Conference
Notice:Closed - See Note 4331.l to move to IOSG::ALL-IN-1
Moderator:IOSG::PYE
Created:Thu Jan 30 1992
Last Modified:Tue Jan 23 1996
Last Successful Update:Fri Jun 06 1997
Number of topics:4343
Total number of notes:18308

679.0. "Updating User Profiles problem - can anyone help?" by LARVAE::COLLINS_J () Tue May 12 1992 23:17

    Users on one of the ALL-IN-1 clusters I am managing on behalf of
    Digital, are experiencing problems updating their profile -
    the message returned says "cannot change that information - profile was
    not updated" or words to that effect.
    
    First of all some background info that may or may not be of relevance.
    
    Some of the users, have access to "Joint" accounts.  These
    joint accounts or Job Title accounts (JT) as they are known here 
    are protected by ACL'S and allocated Idendifiers are granted to the users 
    who access them. The JT accout does not require a VMS directory.
    To access a JT account the user would go to BA menu 
    and select the option JT and into the Jobtitle account 
    (using NEWDIR basically). 
    
    
    Now the problem:
    
    I logged into a users account and then into the JT account that 
    was experiencing the problem and
    sure enough the message "cannot change ..... profile not updated" was
    returned. 
    
    I then Granted myself access to the same JT account, took away all
    privileges on my account, changed my login to be identical to the users, 
    accessed the JT account through my own account and updated the 
    UP successfully.  I even checked the users ALL-IN-1 profile against my
    own and basically they were identical.
    It appears, that no matter what I do - I can still update
    the profile, but others cann't.
    
    Turned on Trace in my account to locate the file that did the update -
    namely SMNETUPDT - there were 2 versions currently in use 1 in
    $1$DUA326:[ALLIN1_1.SITE.LIB_BRITISH] dated 13-OCT-1988 
    the other in Directory $1$DUA326:[ALLIN1_1.LIB_SHARE]30-MAY-1990 the
    latter being the 2.4 version. In turn I renamed both versions, so that
    only one version was current, but whichever one I used I was still able
    to update my JT profile.
    
    The next step is to run a trace on an account that fails to update and then
    check the differences, which can be a little tricky as these users
    generally work offshore and are little difficult to get hold of, but
    I'll try again tomorrow!  In the meatime can anyone shed anylight on
    this - any pointers or information will be welcome - I along with 2
    colleagues have together spent many "happy" hours trying to
    understand what's going on, with not much luck!       
    
    
    Thanks in advance
    Regards
    Joan
    
    
    
    
T.RTitleUserPersonal
Name
DateLines
679.1OA$ADMIN makes the differenceBUFFER::VICKERSRearranging the DEChairsWed May 13 1992 01:3827
    Joan,

    Almost certainly, the reason that you were able to change the profile
    records even with no privileges is that you have the OA$ADMIN
    identifier.  Only accounts with OA$ADMIN are allowed to change profile
    records which they do not own.

    I am not aware of any way around this particular part of the ALL-IN-1
    security system.

    It sounds like the users on the system are sufficiently otherwise
    engaged that giving their VMS UAF records the OA$ADMIN privilege
    shouldn't be THAT risky.  If they don't have the ADMIN forms library
    they won't be able to get to the UI of the administrator subsystem. 
    A sufficiently computer and system knowledgeable person could use
    OA$ADMIN to submit batch jobs that could do some harm.

    You certainly could try granting the OA$ADMIN identifier to one of the
    user accounts and verify that the 'joint' can be rolled that way.  You
    then have the security issues to ponder.  Hopefully, someone can give
    you some pointers that may be less risky.

    I assume that these 'joints' are the safe kind.  Safe meaning that they
    are in Great Britain and not inhaled?  That's Bill Clinton 'humour'.

    Keep smiling,
    don
679.2A Quick play with ACLs?IOSG::PYEGraham - ALL-IN-1 Sorcerer's ApprenticeWed May 13 1992 09:5019
    The profile can be updated if the updating process has *DEFAULT* access
    to the profile file. As Don says, there's also a special check for
    Administrators, although I can't remember whether it's based on the
    Admin flsag in the profile, or having the ACL.
    
    It's possible that you may just be able to give people the Admin flag
    and not the ACL, causing the image to raise provs to access it. But
    maybe not. Even if this worked, you'd then get the problem that seeing
    the Admin flag at initialisation time, we'd try to open the SYSTEM.PST
    for writer, but fail, since the user wouldn't have the ACL to get to
    it.
    
    Perhaps you could just put some write ACLs on the profile, which you
    just grant to these JT users?
    
    Graham
    
    PS In Britain, "joint" still has the meaning of what one of my college
    friends used to call "naughty ciggies"....
679.32.4 Upgrade could be the problem??LARVAE::COLLINS_JWed May 13 1992 10:5429
    >Almost certainly, the reason that you were able to change the profile
    >records even with no privileges is that you have the OA$ADMIN
    >identifier.
    
    I did have the OA$ADMIN id originally, but I removed it from my UA
    along with other all other privileges.  My account 'looked' exactly
    the same as the user's account I was testing.
    
    >The profile can be updated if the updating process has *DEFAULT*
    >access to the profile file.
    
    Sorry to be a pain, but could you explain the above - I'm still
    fairly new to ALL-IN-1 and as I'm begining to find out - there's a lot
    to  learn and understand!
    
    One thing I forgot to mention in all this, these users were able to
    update their profile prior to 2.4 upgrade that took place recently!
    
    I'm going to attempt to speak to user, log into his account and put a
    trace on then do the same on my own account and check the differences of
    both. If this doesn't show anything, then I'll do the same from an
    account on the other cluster (This cluster isn't presenting the same
    problem and in theory they're now supposed to be the same "COMMON
    SYSTEM" In practice however....well I'm not so sure...) anyway I will
    let you know the outcome of my findings!!
    
    Thanks & regards
    Joan
    
679.4A slightly fuller story :-)IOSG::PYEGraham - ALL-IN-1 Sorcerer's ApprenticeWed May 13 1992 11:5938
    Joan,
    
    I didn't realise that you were "new on the block" or I would have
    explained it in more detail.
    
    The Profile file is protected against write by anyone other than
    system, so that people can't hack into it to give themselves ALL-IN-1
    privs they shouldn't have. Unfortunately, this means that you can't
    update those fields in the profile that you aresupposed to have access
    to, like mail status etc. So when you try to write to the profile, the
    code turns on its image SYSPRV to write to the file, assuming a certin
    set of checks have passed...
    
    First call the VMS System service $CHECK_ACCESS to see if the user has
    write access to the OA$DATA:PROFILE.DAT file. Now you might want to
    look up the description of this in the books, but basically one of its
    "features" is that it is intended to be used to establish if some other
    user could access a file, so it decided if the access is permitted
    based on what their *default* privs and identifiers are in AUTHORIZE,
    rather than anything that might be currently turned on. So having
    SETPRV as an authorized prov doesn't help, since the system service
    doesn't see that as enabling you to turn on SYSPRV (or BYPASS!!) to get
    to the file.
    
    Then, if the admin flag is set in the profile (NB *NOT* the posession
    of the OA$ADMIN ACL) then privs are turned on to write to the file, so
    it doesn't matter how it's protected or what other privs you have.
    
    Next check whether it's our own record we're trying to change, don't
    allow other records to be changed.
    
    Finally the code checks if the field is one of the fields in the
    PROFILe form, which is the set that unprivileged users are allowed to
    change. If so, turn on image privs and go ahead.
    
    Hope that helps,
    
    Graham