Memorex LOCK - VERSION 2-24 Technical Information Seite 127

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 568
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 126
Establishing Online Security
User Reference
Connectivity Systems, Inc.—Copyright © 2006
Use Pursuant to Company Instructions
2-63
$EPIC Unsecured profile. $EPIC, which cannot be modified, is
provided by the Online Manager to use as a model. After
$DEFSEC is secured, you can grant total system access to
selected users by modeling their user profiles after $EPIC.
Profiles modeled on $EPIC can be modified to create
custom security profiles. To prevent unauthorized access to
the Online Manager, you cannot use $EPIC as a user ID.
Use caution when modeling user profiles after $EPIC and
leaving the user profiles unmodified. If the user profiles are
left unmodified, a user can obtain the profile name and use
it to obtain total system access.
SJA SJA is an example of an unsecured profile that was modeled
after $EPIC.
User ID Definition
Seitenansicht 126
1 2 ... 122 123 124 125 126 127 128 129 130 131 132 ... 567 568

Kommentare zu diesen Handbüchern

Keine Kommentare