Previous | Contents | Index |
Rename a variable.The mvvar command is used to rename a variable.
mvvar variable [-options]
Alternaterename -variable variable
general options:
-[no]log
-[no]confirm
-hostname = target_node
#1 |
---|
Schedule> mvvar sch_test_var |
-confirm
-noconfirm
CONFIRM requests that the user be prompted prior to any operation to verify that the selected entry is the correct one.-node=target_node
The hostname option specifies what hostname (either local or remote) you want the operation performed on. -hostname may be substituted for -node.-log
-nolog
The LOG qualifier causes each completed operation to issue a note to the user.
Delete a variable.The rmvar command is used to delete a variable.
rmvar variable [-options]
Alternatedelete -variable variable
general options:
-[no]log
-[no]confirm
-hostname = target_node
#1 |
---|
Schedule> rmvar sch_test_var |
-confirm
-noconfirm
CONFIRM requests that the user be prompted prior to any operation to verify that the selected entry is the correct one.-node=target_node
The hostname option specifies what hostname (either local or remote) you want the operation performed on. -hostname may be substituted for -node.-log
-nolog
The LOG qualifier causes each completed operation to issue a note to the user.
This chapter references additional commands that relate to the operation of SCHEDULE. These commands are grouped as follows:
Access file commands - These commands all perform operations on the access file. The commands are as follows:
Command | Description |
---|---|
chacc | Modify the access file |
cpacc | Copy the access file to another access file |
lsacc | Display the access file(s) |
mkacc | Create a new access file |
mvacc | Rename the access file |
rmacc | Delete the access file |
Workgroup commands - These commands all perform operations on a Workgroup. The commands are as follows:
Command | Description |
---|---|
chwg | Modify the workgroup |
cpwg | Copy the workgroup to a new workgroup |
lswg | Display the workgroup |
mkwg | Create a new workgroup |
mvwg | Rename the workgroup |
rmwg | Delete the workgroup |
Layout file commands - These commands all perform operations on layout files. The commands are as follows:
Command | Description |
---|---|
cplay | Copy the layout file to a new location |
rmlay | Delete the layout file |
edlay | Edit the layout file |
extlay | Extract the layout file from the database |
inslay | Insert the layout file into the database |
lslay | Display the directory of layouts |
mvlay | Rename the layout file |
catlay | Type the layout file |
Startup file commands - These commands all perform operations on startup files. The commands are as follows:
Command | Description |
---|---|
cpsta | Copy the startup file to a new location |
rmsta | Delete the startup file |
edsta | Edit the startup file |
extsta | Extract the startup file from the database |
inssta | Insert the startup file into the database |
lssta | Display a directory of startup files |
mvsta | Rename the startup file |
catsta | Type the startup file |
General purpose commands - These are are general purpose SCHEDULE commands. The commands are as follows:
Command | Description |
---|---|
directory -all | Display a directory of all database items |
prompt | Puts SCHEDULE into prompt mode |
hostname | Set the default node for all commands issued |
cd | Set the default directory for all commands |
hostname | Display the default node |
preprocess | Displays the command list with substituted values of all preprocessor directives |
push | Manually replicate a directory throughout a workgroup |
pwd | Display the default directory |
sho version | Display the SCHEDULE |
source | Run SCHEDULE script from SCHEDULE |
verify | Echo commands to the display |
version | display the SCHEDULE version number |
12.1 Access record commands
Access records are used to grant or deny access to users and groups in
local and remote SCHEDULE client to server connections. The
establishment and updating of records in the database is performed
automatically when users log in and connect to the server from local or
remote clients. However, it may be necessary to edit records to grant
more or less privilege or to adjust proxy settings from a remote node.
The Access Records are stored in several directories that are accessible to users with All Access privileges. These directories are:
Directory | Description |
---|---|
/syscontrol/ | Top level directory for access records |
/syscontrol/users/ | User access records |
/syscontrol/groups/ | Group access records |
/syscontrol/identifiers/ | Identifiers for group and user records. Assigned by the system |
/sysproxy/ | Top directory for proxy records |
The SYSPROXY directory contains subdirectories that contain proxy map information for any users that have connected to the current local server. When a user attempts to connect to the server, a hierarchical search is performed to determine if the user has connected previously and then grants whatever privileges are assigned. The search is performed in the following order:
Directory names representing the domain and node name of incoming remote connections use a variety of conventions. These are:
Directory | Description |
---|---|
/fjones/ | Simple host name |
/home_domain _2Efjones/ | Fully qualified NT Domain name |
/fjones _2Ei _2Ds _2Ee _2E com/ | Fully qualified TCP/IP Domain Name |
/192 _2E168 _2E0 _2E142/ | IP Address |
Because of multiple platform compatibility issues, periods(.), slashes(/), back slashes(\) and dashes (-) are represented symbolically within directory names under the SYSPROXY directory at the command prompt. These symbols are: _2E for period, _2F for slash, _5C for back slash and _2D for dash. |
Modify an access file.The chacc command is used to modify an access file.
chacc access [-options]
Alternatemodify -access
general options:
-comment=comment
-[no]log
-[no]confirm
-identifier=id
-idtype=type
-idname=name
-local_user=user_name
-member=group
-password=password
-privileges=access_priv
-type=access_type
#1 |
---|
Schedule> chacc pjones -privileges=allaccess |
-comment
The COMMENT option is the comment that is associated with a variable.-confirm
-noconfirm
CONFIRM requests that the user be prompted prior to any operation to verify that the selected entry is the correct one.-identifier=id
The IDENTIFIER option is used to map the access record to a distinct id number. This is usually performed automatically when the record is created.Usage: User Settings, Group Settings, Map Identifier, Next Identifier
-idtype=type
The IDTYPE option is the used in the map identifier record to identify the map as a User or Group setting.Usage: Map Identifier (System Created)
-idname=name
The IDNAME option is the used in the map identifier record to identify the corresponding access record name.Usage: Map Identifier (System Created)
-local_user=username
The LOCAL_USER option is the used in the "proxy for a remote user" access record to identify the local user that is being mapped to this proxy recordUsage: Proxy for a remote user (System Created)
-member=group
The MEMBER option is used to add an access record to a master record such as Administrator. For instance is you add a user to the Administrator record, the user will possess all access rights of Administrator.Usage: User Settings
-log
-nolog
The LOG qualifier causes each completed operation to issue a note to the user.-password=user_password
The PASSWORD option is the system password that is entered the first time you use SCHEDULE.Usage: User Settings
-privileges=access_priv
The PRIVILEGES option is used to assign any of 5 access privileges to an access record. The possible privileges are:
Field Description AllAccess Grant Access to the entire database ReadAll Grant Read Access to the entire database SubmitAny Grant ability to submit any job ChangeUser Grant ability to change the user of a job Disabled Deny all types of access to this user None No access rights Usage: User Settings, Group Settings
-type=access_type
The TYPE option is used to categorize the access record according to how it will be used. The possible types are:
Field Description Group Settings For group access records User Settings For user access records Proxy for a remote user When creating a proxy record for a remote user Map Identifier For internal mapping of access records Next Identifier Place holder for next access record Usage: User Settings, Group Settings, Proxy for Remote User, Map Identifier, Next Identifier
Copy an access record to another access record.The cpacc command is used to copy an access record to a new access record.
cpacc from_access to_access [-options]
Alternatecopy -access from_access to_access
general options:
-[no]log
-[no]confirm
-hostname = target_node
#1 |
---|
Schedule> cpacc sch_test_acc sch_test2_acc |
-confirm
-noconfirm
CONFIRM requests that the user be prompted prior to any operation to verify that the selected entry is the correct one.-node=target_node
The hostname option specifies what hostname (either local or remote) you want the operation performed on. -hostname may be substituted for -node.-log
-nolog
The LOG qualifier causes each completed operation to issue a note to the user.
Previous | Next | Contents | Index |