|
Structure and Terminology Of Natural
Security |
Basic concepts of Natural Security. |
|
Natural Security On Different
Platforms |
Considerations for the use of Natural Security on different platforms, and the
differences between these platforms.
|
| First Steps After the
Installation |
Steps which have to be performed after Natural Security has been installed for
the first time.
|
|
Logging On
|
Rules that apply when a user logs on to Natural under Natural Security. |
|
Finding Your Way In Natural Security |
Various aspects of handling the Natural Security user interface. |
|
Administrator Services |
Descriptions of the functions of the Administrator Services section of Natural
Security.
|
|
User Maintenance
|
User security profiles, their components, and the functions used to create and
maintain them.
|
|
Library Maintenance
|
Library security profiles, their components, and the functions used to create
and maintain them.
|
|
Protecting Libraries |
How to control the access of users to protected libraries. |
|
Protecting Environments |
How to make library protection environment-specific. |
|
Protecting DDMs On z/OS |
How to control the use of DDMs on z/OS computers. |
|
Protecting DDMs On Linux and
Windows |
How to control the use of DDMs on Linux and Windows. |
|
Protecting Utilities |
How to control the use of Natural utilities. |
|
Protecting the Natural Development Server Environment
and Applications |
How to control the use of the Natural Development Server environment, and
Natural Development Server base applications and compound applications.
|
| Protecting the Natural Development
Environment in Eclipse |
How to control the use of the server and navigator views used by a Natural
development environment in Eclipse in conjunction with NaturalONE.
|
|
Protecting Natural RPC Servers and
Services |
How to control the use of Natural remote procedure calls in a client/server
environment.
|
|
Protecting External Objects |
How to control the use of external objects. |
|
Mailboxes |
How to create, maintain and use mailboxes. |
|
Retrieval |
How to review the existing security profile definitions and their
effects.
|
|
Countersignatures
|
How Natural Security administrators control each other. |
|
Functional Security |
How to restrict the availability of functions and make different functions
available for different users.
|
|
Natural Security In Batch Mode |
How to use Natural Security in batch mode. |
|
Transferring Security Data To Another System
File |
How to transfer Natural Security data from one system file to another. |
|
User Exits |
Information on the available user exits. |
|
Application Programming Interfaces |
The subprograms for performing Natural Security functions from outside the
Natural Security library SYSSEC.
|
|
Add-On Products And Plug-Ins |
Considerations for the protection of various add-on products and
plug-ins.
|