UAFHELP.HLB  —  MODIFY
/UIC=value Specifies the user identification code (UIC). The UIC value is a group number in the range from 1 to 37776 (octal) and a member number in the range from 0 to 177776 (octal), which are separated by a comma and enclosed in brackets. VSI reserves group 1 and groups 300-377 for its own use. Each user must have a unique UIC. By default, the UIC value is [200,200].

2.46    /WSDEFAULT

       /WSDEFAULT=value

    Specifies the default working set limit. This represents the
    initial limit to the number of physical pages the process can
    use. (The user can alter the default quantity up to WSQUOTA with
    the DCL command SET WORKING_SET.) By default, a user has 4096
    pagelets on Alpha and Integrity server systems.

    The value cannot be greater than WSMAX. This quota value replaces
    smaller values of PQL_MWSDEFAULT.

2.47    /WSEXTENT

       /WSEXTENT=value

    Specifies the working set maximum. This represents the maximum
    amount of physical memory allowed to the process. The system
    provides memory to a process beyond its working set quota only
    when it has excess free pages. The additional memory is recalled
    by the system if needed.

    The value is an integer equal to or greater than WSQUOTA. By
    default, the value is 16384 pagelets on Alpha and Integrity
    server systems. The value cannot be greater than WSMAX. This
    quota value replaces smaller values of
    PQL_MWSEXTENT.

2.48    /WSQUOTA

       /WSQUOTA=value

    Specifies the working set quota. This is the maximum amount of
    physical memory a user process can lock into its working set. It
    also represents the maximum amount of swap space that the system
    reserves for this process and the maximum amount of physical
    memory that the system allows the process to consume if the
    systemwide memory demand is significant.

    The value cannot be greater than the value of WSMAX and cannot
    exceed 8,192 pagelets on Alpha and Integrity server systems. This
    quota value replaces smaller values of PQL_MWSQUOTA.

3  –  Examples

    1.UAF> MODIFY ROBIN /PASSWORD=SP0172
      %UAF-I-MDFYMSG, user record(s) updated

      The command in this example changes the password for user ROBIN
      without altering any other values in the record.

    2.UAF> MODIFY ROBIN/FLAGS=RESTRICTED
      %UAF-I-MDFYMSG, user record(s) updated

      The command in this example modifies the UAF record for user
      ROBIN by adding the login flag RESTRICTED.

4    /IDENTIFIER

    Modifies an identifier name, its associated value, or its
    attributes in the rights database.

    Format

      MODIFY/IDENTIFIER  id-name

4.1  –  Parameter

 id-name

    Specifies the name of an identifier to be modified.

4.2  –  Qualifiers

4.2.1    /ATTRIBUTES

       /ATTRIBUTES=(keyword[,...])

    Specifies attributes to be associated with the modified
    identifier. The following keywords are valid:

    DYNAMIC       Allows unprivileged holders of the identifier to
                  remove and to restore the identifier from the
                  process rights list by using the DCL command SET
                  RIGHTS_LIST.

    HOLDER_       Prevents people from getting a list of users who
    HIDDEN        hold an identifier, unless they own the identifier
                  themselves.

    NAME_HIDDEN   Allows holders of an identifier to have it
                  translated, either from binary to ASCII or from
                  ASCII to binary, but prevents unauthorized users
                  from translating the identifier.

    NOACCESS      Makes any access rights of the identifier null
                  and void. If a user is granted an identifier with
                  the No Access attribute, that identifier has no
                  effect on the user's access rights to objects. This
                  attribute is a modifier for an identifier with the
                  Resource or Subsystem attribute.

    RESOURCE      Allows holders of an identifier to charge disk
                  space to the identifier. Used only for file
                  objects.

    SUBSYSTEM     Allows holders of the identifier to create and
                  maintain protected subsystems by assigning the
                  Subsystem ACE to the application images in the
                  subsystem. Used only for file objects.

    To remove an attribute from the identifier, add a NO prefix
    to the attribute keyword. For example, to remove the Resource
    attribute, specify /ATTRIBUTES=NORESOURCE.

                                   NOTE

       If you specify the NORESOURCE keyword without naming any
       holder with the /HOLDER qualifier, all holders lose the
       right to charge resources.

4.2.2    /HOLDER

       /HOLDER=username

    Specifies the holder of an identifier whose attributes are to be
    modified. The /HOLDER qualifier is used only in conjunction with
    the /ATTRIBUTES qualifier.

    If you specify /HOLDER, the /NAME and /VALUE qualifiers are
    ignored.

4.2.3    /NAME

       /NAME=new-id-name

    Specifies a new identifier name to be associated with the
    identifier.

4.2.4    /VALUE

       /VALUE=value-specifier

    Specifies a new identifier value. Note that an identifier value
    cannot be modified from a UIC to a non-UIC format or vice versa.
    The following formats are valid for the value-specifier:

    IDENTIFIER:n     An integer value in the range of 65,536 to
                     268,435,455. You can also specify the value
                     in hexadecimal (precede the value with %X) or
                     octal (precede the value with %O).

                     To differentiate general identifiers from UIC
                     identifiers, %X80000000 is added to the value
                     you specify.

    GID:n            GID is the POSIX group identifier. It is an
                     integer value in the range 0 to 16,777,215
                     (%XFFFFFF). The system will add %XA400.0000
                     to the value you specify and then enter this
                     new value into the system RIGHTSLIST as an
                     identifier.

    UIC:uic          A UIC value in the standard UIC format.

4.3  –  Examples

    1.UAF> MODIFY/IDENTIFIER OLD_ID /NAME=NEW_ID
      %UAF-I-RDBMDFYMSG, identifier OLD_ID modified

      The command in this example changes the name of the OLD_ID
      identifier to NEW_ID.

    2.UAF> MODIFY/IDENTIFIER/VALUE=UIC:[300,21] ACCOUNTING
      %UAF-I-RDBMDFYMSG, identifier ACCOUNTING modified

      The command in this example changes the old UIC value of the
      identifier ACCOUNTING to a new value.

    3.UAF> MODIFY/IDENTIFIER/ATTRIBUTES=NORESOURCE-
      _UAF> /HOLDER=CRAMER ACCOUNTING
      %UAF-I-RDBMDFYMSG, identifier ACCOUNTING modified

      The command in this example associates the attribute NORESOURCE
      with the identifier ACCOUNTING in CRAMER's holder record. The
      identifier ACCOUNTING is not changed.

5    /PROXY

    Modifies an entry in the network proxy authorization file to
    specify a different local account as the default proxy account
    for the remote user or to specify no default proxy account for
    the remote user.

    The command modifies an entry in the network proxy authorization
    file NET$PROXY.DAT and, to maintain compatibility with other
    systems, modifies an entry in NETPROXY.DAT.

                                   NOTE

       You must modify the proxy database from a system running the
       current OpenVMS system.

    Format

      MODIFY/PROXY  node::remote-user

5.1  –  Parameters

 node

    Specifies a node name. If you specify an asterisk wildcard
    character (*),  the specified remote user on all nodes is served
    by the local user.

 remote-user

    Specifies the user name of a user at a remote node. If you
    specify an asterisk wildcard character, all users at the
    specified node are served by the local user.

    For systems that are not OpenVMS systems that implement DECnet,
    specifies the UIC of a user at a remote node. You can specify an
    asterisk wildcard in the group and member fields of the UIC.

5.2  –  Qualifier

5.2.1    /DEFAULT

       /DEFAULT[=local-user]
    /NODEFAULT

    Designates the default user name on the local node through which
    proxy access from the remote user is directed. If /NODEFAULT is
    specified, removes the default designation.

5.3  –  Example

  UAF> MODIFY/PROXY MISHA::MARCO /DEFAULT=JOHNSON
  %UAF-I-NAFADDMSG, record successfully modified in NETPROXY.DAT

      The command in this example changes the default proxy account
      for user MARCO on the remote node MISHA to the JOHNSON account.

6    /SYSTEM_PASSWORD

    Changes the systemwide password.

                                   NOTE

       The systemwide password is different from the password for
       the SYSTEM user name. See the note in the Description.

    This command operates similarly to the DCL command SET
    PASSWORD/SYSTEM.

    Format

      MODIFY/SYSTEM_PASSWORD=system-password

6.1  –  Parameter

 system-password

    Specifies the new systemwide password.

6.2  –  Example

  UAF> MODIFY/SYSTEM_PASSWORD=ABRACADABRA
  UAF>

      This command changes the systemwide password to ABRACADABRA.
Close Help