Displays reports for selected UAF records on the current SYS$OUTPUT device. In the list of "Additional information available" in online help, the first group of qualifiers selects specific UAF records for displayed reports. Following these qualifiers, after "Examples," are additional qualifiers, some of which have their own parameters and qualifiers: o /IDENTIFIER-displays information about an identifier o /PROXY-displays authorized proxy access for a specified remote user o /RIGHTS-displays identifiers held by users Format SHOW user-spec
1 – Parameter
user-spec Specifies the user name or UIC of the requested UAF record. If you omit the user-spec parameter, the UAF records of all users are listed. The asterisk (*) and percent sign (%) wildcard characters are permitted in the user name.
2 – Qualifiers
2.1 /BRIEF
Specifies that a brief report be displayed. In the report, the Directory field displays one of the following items: o Disuser-The account has been disabled. o Expired-The account has expired. o A device and directory name-The login device and directory for the account (for example, DOCD$:[SMITH]). If you omit the /BRIEF qualifier, AUTHORIZE displays a full report.
2.2 /FULL
Specifies that a full report be displayed, including identifiers held by the user. Full reports include the details of the limits, privileges, login flags, and the command interpreter as well as the identifiers held by the user. The password is not listed.
2.3 /EXACT
Controls whether the SHOW command matches the search string exactly or treats uppercase and lowercase letters as equivalents. Enclose the specified string within quotation marks (" "). Use /EXACT with the /PAGE=SAVE and /SEARCH qualifiers.
2.4 /HIGHLIGHT
/HIGHLIGHT[=keyword] /NOHIGHLIGHT (default) Identifies how to display the line that contains a string once it is found. The following keywords are valid: BLINK BOLD (default) REVERSE UNDERLINE Use the /HIGHLIGHT qualifier with the /PAGE=SAVE and /SEARCH qualifiers.
2.5 /PAGE
/PAGE[=keyword] /NOPAGE (default) Controls the information display on a screen. The following keywords are valid: CLEAR_SCREEN Clear the screen before displaying the next page. SCROLL Display a continuous stream of information. SAVE[=n] Store information and enable the navigational keys listed in Screen Control Keys. By default, the command saves 5 pages. The maximum page width is 255 columns. Table 1 Screen Control Keys Key or Key Sequence Action Taken When Key or Key Sequence Is Pressed DOWN ARROW Scroll the display down one line KEY LEFT ARROW Scroll the display one column to the left KEY RIGHT ARROW Scroll the display one column to the right KEY UP ARROW KEY Scroll the display up one line Find (E1) Search for a new string in the information being displayed Insert Here Move the display to the right by half a screen (E2) Remove (E3) Move the display to the left by half a screen Select (E4) Switch from 80-column displays to 132-column displays Prev Screen Return to the previous page (E5) Next Screen Display the next page (E6) CTRL/Z Return to the UAF> prompt Help Display AUTHORIZE help text F16 (Do) Switch from the oldest to the newest page Ctrl/W Refresh the display
2.6 /SEARCH
/SEARCH=string Used with the /PAGE=SAVE qualifier to specify a string to find in the information being displayed. You can dynamically change the search string by pressing the Find key (E1) while the information is being displayed.
2.7 /WRAP
/WRAP /NOWRAP (default) Used with the /PAGE=SAVE qualifier to limit the number of columns to the width of the screen and wrap lines that extend beyond the width of the screen to the next line. The /NOWRAP qualifier extends lines beyond the width of the screen. Use the /PAGE=SAVE qualifier and the screen control keys listed in Screen Control Keys to view the entire screen. The SHOW command produces reports on user authorization records. You can select the reports to be displayed, as follows: o To display a single-user report, specify a user name. o To display reports for all users in ascending sequence by user name, specify an asterisk wildcard character (*). o To display reports for all users with a common UIC, specify the UIC. Users with the same UIC are listed in the order in which they were added to the SYSUAF. You can also use the asterisk wildcard character to specify all or part of the UIC, as shown in the following examples: Command Description SHOW [14,*] Displays a brief report for all users in /BRIEF group 14, in ascending sequence by member number. SHOW [*,6] Displays a brief report for all users with a /BRIEF member number of 6. SHOW [*,*] Displays a brief report for all users, in /BRIEF ascending sequence by UIC.
3 – Examples
1.UAF> SHOW ROBIN The command in this example displays a full report for the user ROBIN. The display corresponds to the first example in the description of the ADD command. Most defaults are in effect. Username: ROBIN Owner: JOSEPH ROBIN Account: VMS UIC: [14,6] ([INV,ROBIN]) CLI: DCL Tables: DCLTABLES Default: SYS$USER:[ROBIN] LGICMD: Login Flags: Primary days: Mon Tue Wed Thu Fri Secondary days: Sat Sun No access restrictions Expiration: (none) Pwdminimum: 6 Login Fails: 0 Pwdlifetime: (none) Pwdchange: 15-JAN-2000 14:08 Last Login: (none) (interactive), (none) (non-interactive) Maxjobs: 0 Fillm: 300 Bytlm: 32768 Maxacctjobs: 0 Shrfillm: 0 Pbytlm: 0 Maxdetach: 0 BIOlm: 40 JTquota: 4096 Prclm: 2 DIOlm: 40 WSdef: 256 Prio: 4 ASTlm: 40 WSquo: 512 Queprio: 0 TQElm: 10 WSextent: 1024 CPU: (none) Enqlm: 200 Pgflquo: 32768 Authorized Privileges: TMPMBX NETMBX Default Privileges: TMPMBX NETMBX Identifier Value Attributes CLASS_CA101 %X80010032 NORESOURCE NODYNAMIC CLASS_PY102 %X80010049 NORESOURCE NODYNAMIC NOTE The quotas Pbytlm and Queprio are placeholders only. 2.UAF> SHOW [360,*] /BRIEF The command in this example displays a brief report for every user with a group UIC of 360. Owner Username UIC Account Privs Pri Default Directory JOHN JAMES JAMES [360,201] USER Normal 4 DOCD$:[JAMES] SUZY JONES JONES [360,203] DOC Devour 4 DOCD$:[JONES] CLIFF BROWN BROWN [360,021] DOC All 4 disuser JOY CARTER CARTER [360,005] DOCSEC Group 4 expired 3.UAF> SHOW WELCH This command displays a full report for the restricted user WELCH. This display corresponds to the second example in the description of the ADD command. Username: WELCH Owner: ROB WELCH Account: INV UIC: [14,51] ([14,51]) CLI: DCL Tables: DCLTABLES Default: SYS$USER:[WELCH] LGICMD: SECUREIN Login Flags: Restricted Diswelcome Disnewmail ExtAuth Primary days: Mon Tue Wed Thu Fri Secondary days: Sat Sun Primary 000000000011111111112222 Secondary 000000000011111111112222 Day Hours 012345678901234567890123 Day Hours 012345678901234567890123 Network: ----- No access ------ ##### Full access ###### Batch: #########--------####### ---------#########------ Local: #########--------####### ---------#########------ Dialup: ##### Full access ###### ----- No access ------ Remote: #########--------####### ---------#########------ Expiration: (none) Pwdminimum: 6 Login Fails: 0 Pwdlifetime: (none) Pwdchange: (pre-expired) Last Login: (none) (interactive), (none) (non-interactive) Maxjobs: 0 Fillm: 300 Bytlm: 32768 Maxacctjobs: 0 Shrfillm: 0 Pbytlm: 0 Maxdetach: 0 BIOlm: 40 JTquota: 4096 Prclm: 2 DIOlm: 40 WSdef: 256 Prio: 4 ASTlm: 40 WSquo: 512 Queprio: 4 TQElm: 10 WSextent: 1024 CPU: (none) Enqlm: 200 Pgflquo: 32768 Authorized Privileges: TMPMBX NETMBX Default Privileges: TMPMBX NETMBX Note that WELCH is a captive user who does not receive announcements of new mail or the welcome message when logging in. His login command file, SECUREIN.COM, is presumably a captive command file that controls all of his operations. (Such a command file never exits, but performs operations for its user and logs him out when appropriate.) The CAPTIVE flag prevents WELCH from escaping control of the command file by using Ctrl/Y or other means. Furthermore, he is restricted to logging in between the hours of 5:00 P.M. and 8:59 A.M. on weekdays and 9:00 A.M. and 5:59 P.M. on weekends. Although he is allowed to use dial-up lines at all times during the week, he is not allowed to log in over the network. On weekends, he is further restricted so that he cannot dial in at any time or use the DCL command SET HOST between the hours of 6:00 P.M. and 8:59 A.M.
4 /IDENTIFIER
Displays information about an identifier, such as its name, value, attributes, and holders, on the current SYS$OUTPUT device. Format SHOW/IDENTIFIER [id-name]
4.1 – Parameter
id-name Specifies an identifier name. The identifier name is a string of 1 to 31 alphanumeric characters. The name can contain underscores and dollar signs. It must contain at least one nonnumeric character. If you omit the identifier name, you must specify /USER or /VALUE.
4.2 – Qualifiers
4.2.1 /BRIEF
Specifies a brief listing in which only the identifier name, value, and attributes are displayed. The default format is /BRIEF.
4.2.2 /FULL
Specifies a full listing in which the names of the identifier's holders are displayed along with the identifier's name, value, and attributes.
4.2.3 /USER
/USER=user-spec Specifies one or more users whose identifiers are to be displayed. The user-spec can be a user name or a UIC. You can use the asterisk wildcard character (*) to specify multiple UICs or all user names. UICs must be in the form [*,*], [n,*], [*,n], or [n,n]. A wildcard user name specification (*) displays identifiers alphabetically by user name; a wildcard UIC specification ([*,*]) displays them numerically by UIC.
4.2.4 /VALUE
/VALUE=value-specifier Specifies the value of the identifier to be listed. The following formats are valid for the value-specifier: IDENTIFIER:n An integer value in the range of 65,536 to 268,435,455. You can also specify the value in hexadecimal (precede the value with %X) or octal (precede the value with %O). To differentiate general identifiers from UIC identifiers, %X80000000 is added to the value you specify. GID:n GID is the POSIX group identifier. It is an integer value in the range 0 to 16,777,215 (%XFFFFFF). The system will add %XA400.0000 to the value you specify and then enter this new value into the system RIGHTSLIST as an identifier. UIC:uic A UIC value in the standard UIC format.
4.3 – Examples
1.UAF> SHOW/IDENTIFIER/FULL INVENTORY This command would produce output similar to the following example: Name Value Attributes INVENTORY %X80010006 NORESOURCE NODYNAMIC Holder Attributes ANDERSON NORESOURCE NODYNAMIC BROWN NORESOURCE NODYNAMIC CRAMER NORESOURCE NODYNAMIC 2.UAF> SHOW/IDENTIFIER/USER=ANDERSON This command displays the identifier associated with the user ANDERSON, as follows: Name Value Attributes ANDERSON [000300,000015] NORESOURCE NODYNAMIC The identifier is shown, along with its value and attributes. Note, however, that this is the same result you would produce had you specified ANDERSON's UIC with the following forms of the command: UAF> SHOW/IDENTIFIER/USER=[300,015] UAF> SHOW/IDENTIFIER/VALUE=UIC:[300,015]
5 /PROXY
Displays all authorized proxy access for the specified remote user. Format SHOW/PROXY node::remote-user
5.1 – Parameters
node Specifies the name of a network node in the network proxy authorization file. The asterisk wildcard character (*) is permitted in the node specification. remote-user Specifies the user name or UIC of a user on a remote node. The asterisk wildcard character (*) is permitted in the remote-user specification.
5.2 – Examples
1.UAF> SHOW/PROXY SAMPLE::[200,100] Default proxies are flagged with an * SAMPLE::[200,100] MARCO * PROXY2 PROXY3 The command in this example displays all authorized proxy access for the user on node SAMPLE with a UIC of [200,100]. The default proxy account can be changed from MARCO to PROXY2 or PROXY3 with the MODIFY/PROXY command. 2.UAF> SHOW/PROXY *::* Default proxies are flagged with (D) TAO:.TWA.RANCH::MARTINEZ MARTINEZ (D) SALES_READER UAF> show/proxy/old *::* Default proxies are flagged with (D) RANCH::MARTINEZ MARTINEZ (D) SALES_READER The command in this example displays information about local authorized proxy access on a system running DECnet-Plus. The first command draws information from the file NET$PROXY.DAT. By including the /OLD qualifier on the SHOW/PROXY command, AUTHORIZE displays information from the file NETPROXY.DAT.
6 /RIGHTS
Displays the identifiers held by the specified identifiers or, if /USER is specified, all identifiers held by the specified users. Format SHOW/RIGHTS [id-name]
6.1 – Parameter
id-name Specifies the name of the identifier associated with the user. If you omit the identifier name, you must specify the /USER qualifier.
6.2 – Qualifier
6.2.1 /USER
/USER=user-spec Specifies one or more users whose identifiers are to be listed. The user-spec can be a user name or a UIC. You can use the asterisk wildcard character (*) to specify multiple UICs or all user names. UICs must be in the form [*,*], [n,*], [*,n], or [n,n]. A wildcard user name specification (*) or wildcard UIC specification ([*,*]) displays all identifiers held by users. The wildcard user name specification displays holders' user names alphabetically; the wildcard UIC specification displays them in the numerical order of their UICs.
6.3 – Example
UAF> SHOW/RIGHTS ANDERSON This command displays all identifiers held by the user ANDERSON. For example: Name Value Attributes INVENTORY %X80010006 NORESOURCE NODYNAMIC PAYROLL %X80010022 NORESOURCE NODYNAMIC Note that the following formats of the command produce the same result: SHOW/RIGHTS/USER=ANDERSON SHOW/RIGHTS/USER=[300,015]