| Title: | Ask the Storage Architecture Group | 
| Notice: | Check out our web page at http://www-starch.shr.dec.com | 
| Moderator: | SSAG::TERZA N | 
| Created: | Wed Oct 15 1986 | 
| Last Modified: | Fri Jun 06 1997 | 
| Last Successful Update: | Fri Jun 06 1997 | 
| Number of topics: | 6756 | 
| Total number of notes: | 25276 | 
I have a customer who is asking details on how the security scheme is implemented in the SWCC. He is concerned that anyone that has access through the net and has a copy of SWCC will be able to change the config. The SPD points to the contrary but does not provide us with any details. Can someone explain (or provide a document) how security is implemented? Andre J. Courchesne Digital Montreal
| T.R | Title | User | Personal Name | Date | Lines | 
|---|---|---|---|---|---|
| 6695.1 | pointer | PCBUOA::WHITEC | Parrot_Trooper | Fri May 16 1997 06:39 | 9 | 
|     We have the DOCS posted on our WEB as an integral part of ServerWORKS
    product family.  akin40.ako.dec.com and click on Digital ServerWORKS
    Navigate your way to the kits and have a look at SWCC Doc set.
    
    or just go here:
    
    http://akin40.ako.dec.com/~theworks/kits/sw22ssb_web/SWCC/DOCS/
    
    Chet
 | |||||
| 6695.2 | TINCUP::RIDGE | I don't know where I'm at, but I'm nearly there! | Fri May 16 1997 09:23 | 6 | |
| The determination is of access is made by the AGENT and how it is set up. The agent had to be set up to allow a specific tcpip address access and it also must be granted the "configuration/reconfiguration" privilege. The documentation (re .-1) will show by example | |||||