This documentation describes all functions and aspects of usage of Natural Security. It applies to Natural Security on all supported platforms.
This documentation is intended for users of Natural Security, that is, users who are to be defined in Natural Security as users of type ADMINISTRATOR. The reader is assumed to be familiar with and have a good general understanding of Natural.
Structure And Terminology Of Natural Security | Basic concepts of Natural Security. | |
Natural Security On Different Platforms | Considerations for the use of Natural Security on different platforms, and the differences between these platforms. | |
Logging On | Rules that apply when a user logs on to Natural under Natural Security. | |
Finding Your Way In Natural Security | Various aspects of handling the Natural Security user interface. | |
Administrator Services | Descriptions of the functions of the Administrator Services section of Natural Security. | |
User Maintenance | User security profiles, their components, and the functions used to create and maintain them. | |
Library Maintenance | Library security profiles, their components, and the functions used to create and maintain them. | |
Protecting Libraries | How to control the access of users to protected libraries. | |
Protecting Environments | How to make library protection environment-specific. | |
Protecting DDMs On Mainframes | How to control the use of DDMs on mainframe computers. | |
Protecting DDMs On UNIX, OpenVMS And Windows | How to control the use of DDMs on UNIX, OpenVMS and Windows. | |
Protecting Utilities | How to control the use of Natural utilities. | |
Protecting the Natural Development Server Environment and Applications | How to control the use of the Natural Development Server environment, and Natural Development Server base applications and compound applications. | |
Protecting the Natural for Eclipse Environment | How to control the use of the server and navigator views used by Natural for Eclipse. | |
Protecting Natural RPC Servers and Services | How to control the use of Natural remote procedure calls in a client/server environment. | |
Protecting External Objects | How to control the use of external objects. | |
Mailboxes | How to create, maintain and use mailboxes. | |
Retrieval | How to review the existing security profile definitions and their effects. | |
Countersignatures | How Natural Security administrators control each other. | |
Functional Security | How to restrict the availability of functions and make different functions available for different users. | |
Natural Security In Batch Mode | How to use Natural Security in batch mode. | |
Transferring Security Data To Another System File | How to transfer Natural Security data from one system file to another. | |
User Exits | Information on the available user exits. | |
Application Programming Interfaces | The subprograms for performing Natural Security functions from outside the Natural Security library SYSSEC. | |
Add-On Products And Plug-Ins | Considerations for the protection of various add-on products and plug-ins. |
For information on how to install Natural Security, see the Natural Installation documentation.
For information on changes, enhancements and new features provided with the current version, see the Natural Release Notes.
Warning: If you have multiple versions of Natural Security on a shared FSEC system file, you should use only the latest version for the maintenance of your security data. If you maintain the data with an older version, the consistency of the data cannot be guaranteed, particularly as far as items introduced with later versions are concerned. |