2.46 /WSDEFAULT
/WSDEFAULT=value Specifies the default working set limit. This represents the initial limit to the number of physical pages the process can use. (The user can alter the default quantity up to WSQUOTA with the DCL command SET WORKING_SET.) By default, a user has 4096 pagelets on Alpha and Integrity server systems. The value cannot be greater than WSMAX. This quota value replaces smaller values of PQL_MWSDEFAULT.
2.47 /WSEXTENT
/WSEXTENT=value Specifies the working set maximum. This represents the maximum amount of physical memory allowed to the process. The system provides memory to a process beyond its working set quota only when it has excess free pages. The additional memory is recalled by the system if needed. The value is an integer equal to or greater than WSQUOTA. By default, the value is 16384 pagelets on Alpha and Integrity server systems. The value cannot be greater than WSMAX. This quota value replaces smaller values of PQL_MWSEXTENT.
2.48 /WSQUOTA
/WSQUOTA=value Specifies the working set quota. This is the maximum amount of physical memory a user process can lock into its working set. It also represents the maximum amount of swap space that the system reserves for this process and the maximum amount of physical memory that the system allows the process to consume if the systemwide memory demand is significant. The value cannot be greater than the value of WSMAX and cannot exceed 8,192 pagelets on Alpha and Integrity server systems. This quota value replaces smaller values of PQL_MWSQUOTA.
3 – Examples
1.UAF> MODIFY ROBIN /PASSWORD=SP0172 %UAF-I-MDFYMSG, user record(s) updated The command in this example changes the password for user ROBIN without altering any other values in the record. 2.UAF> MODIFY ROBIN/FLAGS=RESTRICTED %UAF-I-MDFYMSG, user record(s) updated The command in this example modifies the UAF record for user ROBIN by adding the login flag RESTRICTED.
4 /IDENTIFIER
Modifies an identifier name, its associated value, or its attributes in the rights database. Format MODIFY/IDENTIFIER id-name
4.1 – Parameter
id-name Specifies the name of an identifier to be modified.
4.2 – Qualifiers
4.2.1 /ATTRIBUTES
/ATTRIBUTES=(keyword[,...]) Specifies attributes to be associated with the modified identifier. The following keywords are valid: DYNAMIC Allows unprivileged holders of the identifier to remove and to restore the identifier from the process rights list by using the DCL command SET RIGHTS_LIST. HOLDER_ Prevents people from getting a list of users who HIDDEN hold an identifier, unless they own the identifier themselves. NAME_HIDDEN Allows holders of an identifier to have it translated, either from binary to ASCII or from ASCII to binary, but prevents unauthorized users from translating the identifier. NOACCESS Makes any access rights of the identifier null and void. If a user is granted an identifier with the No Access attribute, that identifier has no effect on the user's access rights to objects. This attribute is a modifier for an identifier with the Resource or Subsystem attribute. RESOURCE Allows holders of an identifier to charge disk space to the identifier. Used only for file objects. SUBSYSTEM Allows holders of the identifier to create and maintain protected subsystems by assigning the Subsystem ACE to the application images in the subsystem. Used only for file objects. To remove an attribute from the identifier, add a NO prefix to the attribute keyword. For example, to remove the Resource attribute, specify /ATTRIBUTES=NORESOURCE. NOTE If you specify the NORESOURCE keyword without naming any holder with the /HOLDER qualifier, all holders lose the right to charge resources.
4.2.2 /HOLDER
/HOLDER=username Specifies the holder of an identifier whose attributes are to be modified. The /HOLDER qualifier is used only in conjunction with the /ATTRIBUTES qualifier. If you specify /HOLDER, the /NAME and /VALUE qualifiers are ignored.
4.2.3 /NAME
/NAME=new-id-name Specifies a new identifier name to be associated with the identifier.
4.2.4 /VALUE
/VALUE=value-specifier Specifies a new identifier value. Note that an identifier value cannot be modified from a UIC to a non-UIC format or vice versa. The following formats are valid for the value-specifier: IDENTIFIER:n An integer value in the range of 65,536 to 268,435,455. You can also specify the value in hexadecimal (precede the value with %X) or octal (precede the value with %O). To differentiate general identifiers from UIC identifiers, %X80000000 is added to the value you specify. GID:n GID is the POSIX group identifier. It is an integer value in the range 0 to 16,777,215 (%XFFFFFF). The system will add %XA400.0000 to the value you specify and then enter this new value into the system RIGHTSLIST as an identifier. UIC:uic A UIC value in the standard UIC format.
4.3 – Examples
1.UAF> MODIFY/IDENTIFIER OLD_ID /NAME=NEW_ID %UAF-I-RDBMDFYMSG, identifier OLD_ID modified The command in this example changes the name of the OLD_ID identifier to NEW_ID. 2.UAF> MODIFY/IDENTIFIER/VALUE=UIC:[300,21] ACCOUNTING %UAF-I-RDBMDFYMSG, identifier ACCOUNTING modified The command in this example changes the old UIC value of the identifier ACCOUNTING to a new value. 3.UAF> MODIFY/IDENTIFIER/ATTRIBUTES=NORESOURCE- _UAF> /HOLDER=CRAMER ACCOUNTING %UAF-I-RDBMDFYMSG, identifier ACCOUNTING modified The command in this example associates the attribute NORESOURCE with the identifier ACCOUNTING in CRAMER's holder record. The identifier ACCOUNTING is not changed.
5 /PROXY
Modifies an entry in the network proxy authorization file to specify a different local account as the default proxy account for the remote user or to specify no default proxy account for the remote user. The command modifies an entry in the network proxy authorization file NET$PROXY.DAT and, to maintain compatibility with other systems, modifies an entry in NETPROXY.DAT. NOTE You must modify the proxy database from a system running the current OpenVMS system. Format MODIFY/PROXY node::remote-user
5.1 – Parameters
node Specifies a node name. If you specify an asterisk wildcard character (*), the specified remote user on all nodes is served by the local user. remote-user Specifies the user name of a user at a remote node. If you specify an asterisk wildcard character, all users at the specified node are served by the local user. For systems that are not OpenVMS systems that implement DECnet, specifies the UIC of a user at a remote node. You can specify an asterisk wildcard in the group and member fields of the UIC.
5.2 – Qualifier
5.2.1 /DEFAULT
/DEFAULT[=local-user] /NODEFAULT Designates the default user name on the local node through which proxy access from the remote user is directed. If /NODEFAULT is specified, removes the default designation.
5.3 – Example
UAF> MODIFY/PROXY MISHA::MARCO /DEFAULT=JOHNSON %UAF-I-NAFADDMSG, record successfully modified in NETPROXY.DAT The command in this example changes the default proxy account for user MARCO on the remote node MISHA to the JOHNSON account.
6 /SYSTEM_PASSWORD
Changes the systemwide password. NOTE The systemwide password is different from the password for the SYSTEM user name. See the note in the Description. This command operates similarly to the DCL command SET PASSWORD/SYSTEM. Format MODIFY/SYSTEM_PASSWORD=system-password
6.1 – Parameter
system-password Specifies the new systemwide password.
6.2 – Example
UAF> MODIFY/SYSTEM_PASSWORD=ABRACADABRA UAF> This command changes the systemwide password to ABRACADABRA.