Title: | Ask the Storage Architecture Group |
Notice: | Check out our web page at http://www-starch.shr.dec.com |
Moderator: | SSAG::TERZA N |
Created: | Wed Oct 15 1986 |
Last Modified: | Fri Jun 06 1997 |
Last Successful Update: | Fri Jun 06 1997 |
Number of topics: | 6756 |
Total number of notes: | 25276 |
I have a customer who is asking details on how the security scheme is implemented in the SWCC. He is concerned that anyone that has access through the net and has a copy of SWCC will be able to change the config. The SPD points to the contrary but does not provide us with any details. Can someone explain (or provide a document) how security is implemented? Andre J. Courchesne Digital Montreal
T.R | Title | User | Personal Name | Date | Lines |
---|---|---|---|---|---|
6695.1 | pointer | PCBUOA::WHITEC | Parrot_Trooper | Fri May 16 1997 07:39 | 9 |
We have the DOCS posted on our WEB as an integral part of ServerWORKS product family. akin40.ako.dec.com and click on Digital ServerWORKS Navigate your way to the kits and have a look at SWCC Doc set. or just go here: http://akin40.ako.dec.com/~theworks/kits/sw22ssb_web/SWCC/DOCS/ Chet | |||||
6695.2 | TINCUP::RIDGE | I don't know where I'm at, but I'm nearly there! | Fri May 16 1997 10:23 | 6 | |
The determination is of access is made by the AGENT and how it is set up. The agent had to be set up to allow a specific tcpip address access and it also must be granted the "configuration/reconfiguration" privilege. The documentation (re .-1) will show by example |