This documentation is intended for users of Natural Security, that is, users who are to be defined in Natural Security as users of type "Administrator". You should be familiar with and have a good general understanding of Natural.
|Structure and Terminology Of Natural Security||Basic concepts of Natural Security.|
|Natural Security On Different Platforms||Considerations for the use of Natural Security on different platforms, and the differences between these platforms.|
|First Steps After the Installation||Steps which have to be performed after Natural Security has been installed for the first time.|
|Logging On||Rules that apply when a user logs on to Natural under Natural Security.|
|Finding Your Way In Natural Security||Various aspects of handling the Natural Security user interface.|
|Administrator Services||Descriptions of the functions of the Administrator Services section of Natural Security.|
|User Maintenance||User security profiles, their components, and the functions used to create and maintain them.|
|Library Maintenance||Library security profiles, their components, and the functions used to create and maintain them.|
|Protecting Libraries||How to control the access of users to protected libraries.|
|Protecting Environments||How to make library protection environment-specific.|
|Protecting DDMs On Mainframes||How to control the use of DDMs on mainframe computers.|
|Protecting DDMs On UNIX, OpenVMS And Windows||How to control the use of DDMs on UNIX, OpenVMS and Windows.|
|Protecting Utilities||How to control the use of Natural utilities.|
|Protecting the Natural Development Server Environment and Applications||How to control the use of the Natural Development Server environment, and Natural Development Server base applications and compound applications.|
|Protecting the Natural Development Environment in Eclipse||How to control the use of the server and navigator views used by a Natural development environment in Eclipse in conjunction with NaturalONE.|
|Protecting Natural RPC Servers and Services||How to control the use of Natural remote procedure calls in a client/server environment.|
|Protecting External Objects||How to control the use of external objects.|
|Mailboxes||How to create, maintain and use mailboxes.|
|Retrieval||How to review the existing security profile definitions and their effects.|
|Countersignatures||How Natural Security administrators control each other.|
|Functional Security||How to restrict the availability of functions and make different functions available for different users.|
|Natural Security In Batch Mode||How to use Natural Security in batch mode.|
|Transferring Security Data To Another System File||How to transfer Natural Security data from one system file to another.|
|User Exits||Information on the available user exits.|
|Application Programming Interfaces||The subprograms for performing Natural Security functions from
outside the Natural Security library
|Add-On Products And Plug-Ins||Considerations for the protection of various add-on products and plug-ins.|
For information on how to install Natural Security, see the Natural Installation documentation.
For information on changes, enhancements and new features provided with the current version, see the Natural Release Notes.
The user ID
If you have multiple versions of Natural Security on a shared FSEC system file, you should use only the latest version for the maintenance of your security data. If you maintain the data with an older version, the consistency of the data cannot be guaranteed, particularly as far as items introduced with later versions are concerned.