Memorex LOCK - VERSION 2-24 Informations techniques Page 127

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 568
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 126
Establishing Online Security
User Reference
Connectivity Systems, Inc.—Copyright © 2006
Use Pursuant to Company Instructions
2-63
$EPIC Unsecured profile. $EPIC, which cannot be modified, is
provided by the Online Manager to use as a model. After
$DEFSEC is secured, you can grant total system access to
selected users by modeling their user profiles after $EPIC.
Profiles modeled on $EPIC can be modified to create
custom security profiles. To prevent unauthorized access to
the Online Manager, you cannot use $EPIC as a user ID.
Use caution when modeling user profiles after $EPIC and
leaving the user profiles unmodified. If the user profiles are
left unmodified, a user can obtain the profile name and use
it to obtain total system access.
SJA SJA is an example of an unsecured profile that was modeled
after $EPIC.
User ID Definition
Vue de la page 126
1 2 ... 122 123 124 125 126 127 128 129 130 131 132 ... 567 568

Commentaires sur ces manuels

Pas de commentaire