[Access to Wang masthead]

Order to the System

Utilities that enhance system management

From "VS Workshop",  Access to Wang, July 1988
  [ Prior Article ]     [ Return to the Catalog of articles ]     [ Next Article ]  

Concluding this discussion on system management, I'll cover some utilities for reviewing performance considerations of new systems, access control, configuration management and some miscellaneous concerns. As before, I'm stressing programs available for little or no cost, and I'll point out when commercial software might be a better choice. (See the end of this article for availability of utilities mentioned.)

Performance and new Systems. Good system performance begins with well-designed, efficient applications. Since most of us use packaged software to some extent, the amount of control over system design is minimal. Because system performance and application design could fill several columns, I'll save most of this discussion for the future. But there are two items of interest for the in-house software developer.

Access control

I use the term access control to cover the related items of security, user administration and usage monitoring. This broad category includes application control of user rights, the process of administering security and any need to monitor and perhaps bill users for the resources they use.

The primary goal of the security portion is to ensure that access to data and system resources is limited to those that truly need it. Other goals might include scheduled access control changes (e.g., passwords), routine review of security profiles and logon information and review of changes to these parameters. User administration is the mechanical means of maintaining the security system. Finally, usage monitoring is a means of gathering usage information for billing and configuration purposes.

Some of the utilities and systems that can be used to design an access control system include the following.

Short of using the Security Logging facility, there are few methods of routinely monitoring changes to the security system (the USERLIST file). One approach I've used is to run a listing from the SECURITY utility and compare it to last week's listing using the COMPAREF (COMPARE File) utility. The split-screen format of COMPAREF is particularly handy for this purpose, and any changes to the file are readily apparent.

While these and other utilities exist to fill access control needs, the best software must be purchased. Usage control and security systems are often incorporated into packaged software (financial software, payroll systems, etc.) or within menu-generating software. If you're involved in a high-security environment or wish to bill users for their resource usage, I recommend investigating some of the commercial offerings in this field.

Configuration management

I define configuration management as a method of tying the physical elements of a system (offices, users, workstations, cables, ports) to the logical elements of a system (device numbers). This process is often not as simple as it appears; there are many subtleties to the specifics of a peripheral connection and these elements change constantly.

The ideal configuration management system would allow access along several paths (device number, user location, NETMUX manufacturing ID, VS controller, device type, etc.), providing information of use for troubleshooting and changes to the configuration. In response to these needs, I'm aware of two utilities.

Other items

Other items related to system management I have targeted for further analysis include:

For more information on the products mentioned in this column, look into the following:


  [ Prior Article ]     [ Return to the Catalog of articles ]     [ Next Article ]  


Copyright © 1988 Dennis S. Barnes
Reprints of this article are permitted without notification if the source of the information is clearly identified