2.46 /WSDEFAULT
/WSDEFAULT=value
Specifies the default working set limit. This represents the
initial limit to the number of physical pages the process can
use. (The user can alter the default quantity up to WSQUOTA with
the DCL command SET WORKING_SET.) By default, a user has 4096
pagelets on Alpha and Integrity server systems.
The value cannot be greater than WSMAX. This quota value replaces
smaller values of PQL_MWSDEFAULT.
2.47 /WSEXTENT
/WSEXTENT=value
Specifies the working set maximum. This represents the maximum
amount of physical memory allowed to the process. The system
provides memory to a process beyond its working set quota only
when it has excess free pages. The additional memory is recalled
by the system if needed.
The value is an integer equal to or greater than WSQUOTA. By
default, the value is 16384 pagelets on Alpha and Integrity
server systems. The value cannot be greater than WSMAX. This
quota value replaces smaller values of
PQL_MWSEXTENT.
2.48 /WSQUOTA
/WSQUOTA=value
Specifies the working set quota. This is the maximum amount of
physical memory a user process can lock into its working set. It
also represents the maximum amount of swap space that the system
reserves for this process and the maximum amount of physical
memory that the system allows the process to consume if the
systemwide memory demand is significant.
The value cannot be greater than the value of WSMAX and cannot
exceed 8,192 pagelets on Alpha and Integrity server systems. This
quota value replaces smaller values of PQL_MWSQUOTA.
3 – Examples
1.UAF> MODIFY ROBIN /PASSWORD=SP0172
%UAF-I-MDFYMSG, user record(s) updated
The command in this example changes the password for user ROBIN
without altering any other values in the record.
2.UAF> MODIFY ROBIN/FLAGS=RESTRICTED
%UAF-I-MDFYMSG, user record(s) updated
The command in this example modifies the UAF record for user
ROBIN by adding the login flag RESTRICTED.
4 /IDENTIFIER
Modifies an identifier name, its associated value, or its
attributes in the rights database.
Format
MODIFY/IDENTIFIER id-name
4.1 – Parameter
id-name
Specifies the name of an identifier to be modified.
4.2 – Qualifiers
4.2.1 /ATTRIBUTES
/ATTRIBUTES=(keyword[,...])
Specifies attributes to be associated with the modified
identifier. The following keywords are valid:
DYNAMIC Allows unprivileged holders of the identifier to
remove and to restore the identifier from the
process rights list by using the DCL command SET
RIGHTS_LIST.
HOLDER_ Prevents people from getting a list of users who
HIDDEN hold an identifier, unless they own the identifier
themselves.
NAME_HIDDEN Allows holders of an identifier to have it
translated, either from binary to ASCII or from
ASCII to binary, but prevents unauthorized users
from translating the identifier.
NOACCESS Makes any access rights of the identifier null
and void. If a user is granted an identifier with
the No Access attribute, that identifier has no
effect on the user's access rights to objects. This
attribute is a modifier for an identifier with the
Resource or Subsystem attribute.
RESOURCE Allows holders of an identifier to charge disk
space to the identifier. Used only for file
objects.
SUBSYSTEM Allows holders of the identifier to create and
maintain protected subsystems by assigning the
Subsystem ACE to the application images in the
subsystem. Used only for file objects.
To remove an attribute from the identifier, add a NO prefix
to the attribute keyword. For example, to remove the Resource
attribute, specify /ATTRIBUTES=NORESOURCE.
NOTE
If you specify the NORESOURCE keyword without naming any
holder with the /HOLDER qualifier, all holders lose the
right to charge resources.
4.2.2 /HOLDER
/HOLDER=username
Specifies the holder of an identifier whose attributes are to be
modified. The /HOLDER qualifier is used only in conjunction with
the /ATTRIBUTES qualifier.
If you specify /HOLDER, the /NAME and /VALUE qualifiers are
ignored.
4.2.3 /NAME
/NAME=new-id-name
Specifies a new identifier name to be associated with the
identifier.
4.2.4 /VALUE
/VALUE=value-specifier
Specifies a new identifier value. Note that an identifier value
cannot be modified from a UIC to a non-UIC format or vice versa.
The following formats are valid for the value-specifier:
IDENTIFIER:n An integer value in the range of 65,536 to
268,435,455. You can also specify the value
in hexadecimal (precede the value with %X) or
octal (precede the value with %O).
To differentiate general identifiers from UIC
identifiers, %X80000000 is added to the value
you specify.
GID:n GID is the POSIX group identifier. It is an
integer value in the range 0 to 16,777,215
(%XFFFFFF). The system will add %XA400.0000
to the value you specify and then enter this
new value into the system RIGHTSLIST as an
identifier.
UIC:uic A UIC value in the standard UIC format.
4.3 – Examples
1.UAF> MODIFY/IDENTIFIER OLD_ID /NAME=NEW_ID
%UAF-I-RDBMDFYMSG, identifier OLD_ID modified
The command in this example changes the name of the OLD_ID
identifier to NEW_ID.
2.UAF> MODIFY/IDENTIFIER/VALUE=UIC:[300,21] ACCOUNTING
%UAF-I-RDBMDFYMSG, identifier ACCOUNTING modified
The command in this example changes the old UIC value of the
identifier ACCOUNTING to a new value.
3.UAF> MODIFY/IDENTIFIER/ATTRIBUTES=NORESOURCE-
_UAF> /HOLDER=CRAMER ACCOUNTING
%UAF-I-RDBMDFYMSG, identifier ACCOUNTING modified
The command in this example associates the attribute NORESOURCE
with the identifier ACCOUNTING in CRAMER's holder record. The
identifier ACCOUNTING is not changed.
5 /PROXY
Modifies an entry in the network proxy authorization file to
specify a different local account as the default proxy account
for the remote user or to specify no default proxy account for
the remote user.
The command modifies an entry in the network proxy authorization
file NET$PROXY.DAT and, to maintain compatibility with other
systems, modifies an entry in NETPROXY.DAT.
NOTE
You must modify the proxy database from a system running the
current OpenVMS system.
Format
MODIFY/PROXY node::remote-user
5.1 – Parameters
node
Specifies a node name. If you specify an asterisk wildcard
character (*), the specified remote user on all nodes is served
by the local user.
remote-user
Specifies the user name of a user at a remote node. If you
specify an asterisk wildcard character, all users at the
specified node are served by the local user.
For systems that are not OpenVMS systems that implement DECnet,
specifies the UIC of a user at a remote node. You can specify an
asterisk wildcard in the group and member fields of the UIC.
5.2 – Qualifier
5.2.1 /DEFAULT
/DEFAULT[=local-user]
/NODEFAULT
Designates the default user name on the local node through which
proxy access from the remote user is directed. If /NODEFAULT is
specified, removes the default designation.
5.3 – Example
UAF> MODIFY/PROXY MISHA::MARCO /DEFAULT=JOHNSON
%UAF-I-NAFADDMSG, record successfully modified in NETPROXY.DAT
The command in this example changes the default proxy account
for user MARCO on the remote node MISHA to the JOHNSON account.
6 /SYSTEM_PASSWORD
Changes the systemwide password.
NOTE
The systemwide password is different from the password for
the SYSTEM user name. See the note in the Description.
This command operates similarly to the DCL command SET
PASSWORD/SYSTEM.
Format
MODIFY/SYSTEM_PASSWORD=system-password
6.1 – Parameter
system-password
Specifies the new systemwide password.
6.2 – Example
UAF> MODIFY/SYSTEM_PASSWORD=ABRACADABRA
UAF>
This command changes the systemwide password to ABRACADABRA.