[Search for users] [Overall Top Noters] [List of all Conferences] [Download this site]

Conference iosg::all-in-1_v30

Title:*OLD* ALL-IN-1 (tm) Support Conference
Notice:Closed - See Note 4331.l to move to IOSG::ALL-IN-1
Moderator:IOSG::PYE
Created:Thu Jan 30 1992
Last Modified:Tue Jan 23 1996
Last Successful Update:Fri Jun 06 1997
Number of topics:4343
Total number of notes:18308

3401.0. "V3.0 and Inspect" by IAMOK::BUSA () Fri Oct 15 1993 17:59

    This is regarding ALL-IN-1 V3.0 and the DECInspect issue with the 
    OAFC$SERVER and OAFC$DEFAULT accounts.
    
    Our Inspect person stopped by with a potention "fix" for the Inspect
    issue with the OAFC accounts.  The fix was the following:
    
    1. Remove the DISUSER flag from the UAF for both accounts
    2. Add Full Network Access to both accounts
    
    This will supposedly fix the problem of Inspect flagging these
    accounts. It also may help avoid them from being deleted since Inspect 
    flags them and they are disusered, some VMS sys managers think it's ok to
    delete them!
    
    My question is, is this the "right" thing to do for these accounts and
    are there any implications in doing this?  The Inspect person would
    like to publish the above as a fix for the DECInspect issues with the
    OAFC accounts, so I'd like to know if I should encourage or discourage
    the use of this fix.
    
    I've read note #1851 which also refers to this problem and noticed it
    mentions a program run through the scheduler which will update the batch
    access date of the account.  Has anyone else used this method with
    success and would this be a better fix that modifying the UAF records
    as mentioned above?
    
    I need to respond to our Inspect person with what we should do about 
    this Inspect issue and would like feedback/suggestions/comments on
    which way to go and what to recommend.
    
    Any feedback would be appreciated.
    
    Thanks,
    
    Lee
T.RTitleUserPersonal
Name
DateLines
3401.1leave them disuseredCHRLIE::HUSTONFri Oct 15 1993 18:0411
    
    The accounts come as disusered mostly becuase they are priv'd account,
    well the OAFC$SERVER account is, it has the privs to run the FCS and
    as such, we wanted to keep people from logging into it (it has
    sysprv and cmkrnl for instance).
    
    Network access is not there since the account should never be logged in
    to, just used as the uic for starting a detached process.
    
    --Bob
    
3401.2Go for UAF_HACK.EXE ...ZUR01::KURTHPeter Kurth @RLE, R�mlang (Switzerland)Tue Oct 19 1993 11:464
	Hi
	Use the image mentioned in note 1851.7. This is a fix for about 25
	server accounts (*$SERVER).
	Regards, Peter
3401.3HOW ABOUT REMOVE/NOREMOVE_IDENTIFIER OAFC$SERVER?ICS::DARCANGELOThu Nov 04 1993 14:4332
	RE: 3401.1

	If this is the case, that the UIC is used to start detached
	processes, why can't the fix given in the DECinspect notes-
	file be employed by the system manager?  And to take it one
	step further, why can't the developers use this technically
	feasible fix at the time of the installation, saving manual
	labor across the corporation, which continues to down-size?

	Would the developers please comment on this and offer their
	opinion as to the fix suggested in the DECinspect notesfile.
	Would it work? ... would/might there be any adverse effects?

	From the DECinspect notesfile, a fix for server accounts...	

	{This note has been edited to apply to "ALL-IN-1" UAF server
	 accounts.}

 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

 If the *only* thing that OAFC$SERVER account (and OAFC$DEFAULT) is being used
 for is a UIC specification in RUN/DETACH, then you can issue:

 UAF> REMOVE/NOREMOVE_IDENTIFIER OAFC$SERVER
 UAF> REMOVE/NOREMOVE_IDENTIFIER OAFC$DEFAULT

      ... to get rid of the account but keep the UIC identifier around.

 Make sure you keep output (i.e. UAF> LIST OAFC$SERVER) before removing
 the account, in case things stop working and you have to create it
 again.