User profile panel


Select the User profiles option from the Administration/Utilities Menu to display the Profile Selection List panel. Adding or editing a profile displays the User Profile panel, which lists all of the authorizations and security that is associated with the user profile.

User Profile panel

 DDTG DBI1 User Profile Row 1 of 1
Command ===> ________________________________________________ Scroll ===> PAGE

Profile name . . . . . . . . : JOHN
Description . . . . . . . . :  JOHN'S PROFILE

Authorizations
  User security profile . . . : ________
  Courtesy security checks . : _

Select the entry with one of the following. Then press Enter.
  L=List

Act Name Security No. of definitions
 .. OPRX BIGDAWG 1
******************************* Bottom of data ********************************

The following fields are displayed on the User Profile panel:

Field

Description

Profile
name

The name of the user profile that is being edited.

Description

The description of the profile that is being edited.

User security profile

The name of the user security profile to use with this profile. This value is overridden by any security profiles specified for specific OPERTUNEs and subsystems in the user’s access list.

If no value is specified, the DEFAULT security profile is used (see Rules for determining authorizations for more details).

Courtesy security
checks

Whether security is checked at the host before a command is built and sent to the target or if it is checked at the target. Specify one of the following values:

  • Y—Security is checked at the host before a command is built and sent to
    the target.
  • N—Security is checked at the target

If security is set differently for the user on the host than it is on the target, the result will vary. For example, security on the host specifies that the user can only view information and security on the target specifies that the user can execute all commands. If the Courtesy security checks field is set to Y, the user cannot execute any commands on the target because the host security settings indicate that the user can only view information. If the Courtesy security checks field is set to N, the user can execute commands on the target.

Name

The names of the OPERTUNEs that the user is authorized to access are listed.

Security

The security profile associated with the corresponding OPERTUNE. If a security profile is specified, additional restrictions might apply (see Rules for determining authorizations for more information)

No. of definitions

The number of subsystem definitions that are associated with the system profile.

Related topic


 

Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*