| Title: | Ask the Storage Architecture Group |
| Notice: | Check out our web page at http://www-starch.shr.dec.com |
| Moderator: | SSAG::TERZA N |
| Created: | Wed Oct 15 1986 |
| Last Modified: | Fri Jun 06 1997 |
| Last Successful Update: | Fri Jun 06 1997 |
| Number of topics: | 6756 |
| Total number of notes: | 25276 |
I have a customer who is asking details on how the security scheme is implemented in the SWCC. He is concerned that anyone that has access through the net and has a copy of SWCC will be able to change the config. The SPD points to the contrary but does not provide us with any details. Can someone explain (or provide a document) how security is implemented? Andre J. Courchesne Digital Montreal
| T.R | Title | User | Personal Name | Date | Lines |
|---|---|---|---|---|---|
| 6695.1 | pointer | PCBUOA::WHITEC | Parrot_Trooper | Fri May 16 1997 06:39 | 9 |
We have the DOCS posted on our WEB as an integral part of ServerWORKS
product family. akin40.ako.dec.com and click on Digital ServerWORKS
Navigate your way to the kits and have a look at SWCC Doc set.
or just go here:
http://akin40.ako.dec.com/~theworks/kits/sw22ssb_web/SWCC/DOCS/
Chet
| |||||
| 6695.2 | TINCUP::RIDGE | I don't know where I'm at, but I'm nearly there! | Fri May 16 1997 09:23 | 6 | |
The determination is of access is made by the AGENT and how it is set up. The agent had to be set up to allow a specific tcpip address access and it also must be granted the "configuration/reconfiguration" privilege. The documentation (re .-1) will show by example | |||||