SCHEDULE
Automated Job Submission System
Guide and Reference Manual


Previous Contents Index


mvvar

Rename a variable.

The mvvar command is used to rename a variable.


General Format

mvvar variable [-options]

Alternate

rename -variable variable

option summary

general options:

-[no]log
-[no]confirm
-hostname = target_node

Examples

#1

 
 
Schedule> mvvar sch_test_var 
 
 
      


Options

-confirm

-noconfirm

CONFIRM requests that the user be prompted prior to any operation to verify that the selected entry is the correct one.

-node=target_node

The hostname option specifies what hostname (either local or remote) you want the operation performed on. -hostname may be substituted for -node.

-log

-nolog

The LOG qualifier causes each completed operation to issue a note to the user.

rmvar

Delete a variable.

The rmvar command is used to delete a variable.


General Format

rmvar variable [-options]

Alternate

delete -variable variable

option summary

general options:

-[no]log
-[no]confirm
-hostname = target_node

Examples

#1

 
 
Schedule> rmvar sch_test_var 
 
 
      


Options

-confirm

-noconfirm

CONFIRM requests that the user be prompted prior to any operation to verify that the selected entry is the correct one.

-node=target_node

The hostname option specifies what hostname (either local or remote) you want the operation performed on. -hostname may be substituted for -node.

-log

-nolog

The LOG qualifier causes each completed operation to issue a note to the user.


Chapter 12
Additional commands

This chapter references additional commands that relate to the operation of SCHEDULE. These commands are grouped as follows:

Access file commands - These commands all perform operations on the access file. The commands are as follows:
Command Description
chacc Modify the access file
cpacc Copy the access file to another access file
lsacc Display the access file(s)
mkacc Create a new access file
mvacc Rename the access file
rmacc Delete the access file

Workgroup commands - These commands all perform operations on a Workgroup. The commands are as follows:
Command Description
chwg Modify the workgroup
cpwg Copy the workgroup to a new workgroup
lswg Display the workgroup
mkwg Create a new workgroup
mvwg Rename the workgroup
rmwg Delete the workgroup

Layout file commands - These commands all perform operations on layout files. The commands are as follows:
Command Description
cplay Copy the layout file to a new location
rmlay Delete the layout file
edlay Edit the layout file
extlay Extract the layout file from the database
inslay Insert the layout file into the database
lslay Display the directory of layouts
mvlay Rename the layout file
catlay Type the layout file

Startup file commands - These commands all perform operations on startup files. The commands are as follows:
Command Description
cpsta Copy the startup file to a new location
rmsta Delete the startup file
edsta Edit the startup file
extsta Extract the startup file from the database
inssta Insert the startup file into the database
lssta Display a directory of startup files
mvsta Rename the startup file
catsta Type the startup file

General purpose commands - These are are general purpose SCHEDULE commands. The commands are as follows:
Command Description
directory -all Display a directory of all database items
prompt Puts SCHEDULE into prompt mode
hostname Set the default node for all commands issued
cd Set the default directory for all commands
hostname Display the default node
preprocess Displays the command list with substituted values of all preprocessor directives
push Manually replicate a directory throughout a workgroup
pwd Display the default directory
sho version Display the SCHEDULE
source Run SCHEDULE script from SCHEDULE
verify Echo commands to the display
version display the SCHEDULE version number

12.1 Access record commands

Access records are used to grant or deny access to users and groups in local and remote SCHEDULE client to server connections. The establishment and updating of records in the database is performed automatically when users log in and connect to the server from local or remote clients. However, it may be necessary to edit records to grant more or less privilege or to adjust proxy settings from a remote node.

The Access Records are stored in several directories that are accessible to users with All Access privileges. These directories are:
Directory Description
/syscontrol/ Top level directory for access records
/syscontrol/users/ User access records
/syscontrol/groups/ Group access records
/syscontrol/identifiers/ Identifiers for group and user records. Assigned by the system
/sysproxy/ Top directory for proxy records

The SYSPROXY directory contains subdirectories that contain proxy map information for any users that have connected to the current local server. When a user attempts to connect to the server, a hierarchical search is performed to determine if the user has connected previously and then grants whatever privileges are assigned. The search is performed in the following order:

  1. The file schedule_library:sch0_proxy.dat file is searched for user information.
  2. Any directory with a name that is an IP address is searched.
  3. Any directory that is a fully qualified TCP/IP name is searched.
  4. Any directory that is a fully qualified NT domain is searched.
  5. Any directory that is a regular host name is searched.
  6. On OpenVMS systems, the sys$system: proxy file is searched.

Directory names representing the domain and node name of incoming remote connections use a variety of conventions. These are:
Directory Description
/fjones/ Simple host name
/home_domain _2Efjones/ Fully qualified NT Domain name
/fjones _2Ei _2Ds _2Ee _2E com/ Fully qualified TCP/IP Domain Name
/192 _2E168 _2E0 _2E142/ IP Address

Note

Because of multiple platform compatibility issues, periods(.), slashes(/), back slashes(\) and dashes (-) are represented symbolically within directory names under the SYSPROXY directory at the command prompt. These symbols are: _2E for period, _2F for slash, _5C for back slash and _2D for dash.

chacc

Modify an access file.

The chacc command is used to modify an access file.


General Format

chacc access [-options]

Alternate

modify -access

option summary

general options:

-comment=comment
-[no]log
-[no]confirm
-identifier=id
-idtype=type
-idname=name
-local_user=user_name
-member=group
-password=password
-privileges=access_priv
-type=access_type

Examples

#1

 
 
Schedule> chacc pjones -privileges=allaccess 
 
 
      


Options

-comment

The COMMENT option is the comment that is associated with a variable.

-confirm

-noconfirm

CONFIRM requests that the user be prompted prior to any operation to verify that the selected entry is the correct one.

-identifier=id

The IDENTIFIER option is used to map the access record to a distinct id number. This is usually performed automatically when the record is created.

Usage: User Settings, Group Settings, Map Identifier, Next Identifier

-idtype=type

The IDTYPE option is the used in the map identifier record to identify the map as a User or Group setting.

Usage: Map Identifier (System Created)

-idname=name

The IDNAME option is the used in the map identifier record to identify the corresponding access record name.

Usage: Map Identifier (System Created)

-local_user=username

The LOCAL_USER option is the used in the "proxy for a remote user" access record to identify the local user that is being mapped to this proxy record

Usage: Proxy for a remote user (System Created)

-member=group

The MEMBER option is used to add an access record to a master record such as Administrator. For instance is you add a user to the Administrator record, the user will possess all access rights of Administrator.

Usage: User Settings

-log

-nolog

The LOG qualifier causes each completed operation to issue a note to the user.

-password=user_password

The PASSWORD option is the system password that is entered the first time you use SCHEDULE.

Usage: User Settings

-privileges=access_priv

The PRIVILEGES option is used to assign any of 5 access privileges to an access record. The possible privileges are:
Field Description
AllAccess Grant Access to the entire database
ReadAll Grant Read Access to the entire database
SubmitAny Grant ability to submit any job
ChangeUser Grant ability to change the user of a job
Disabled Deny all types of access to this user
None No access rights

Usage: User Settings, Group Settings

-type=access_type

The TYPE option is used to categorize the access record according to how it will be used. The possible types are:
Field Description
Group Settings For group access records
User Settings For user access records
Proxy for a remote user When creating a proxy record for a remote user
Map Identifier For internal mapping of access records
Next Identifier Place holder for next access record

Usage: User Settings, Group Settings, Proxy for Remote User, Map Identifier, Next Identifier


cpacc

Copy an access record to another access record.

The cpacc command is used to copy an access record to a new access record.


General Format

cpacc from_access to_access [-options]

Alternate

copy -access from_access to_access

option summary

general options:

-[no]log
-[no]confirm
-hostname = target_node

Examples

#1

 
 
Schedule> cpacc sch_test_acc sch_test2_acc 
 
 
      


Options

-confirm

-noconfirm

CONFIRM requests that the user be prompted prior to any operation to verify that the selected entry is the correct one.

-node=target_node

The hostname option specifies what hostname (either local or remote) you want the operation performed on. -hostname may be substituted for -node.

-log

-nolog

The LOG qualifier causes each completed operation to issue a note to the user.


Previous Next Contents Index