Permission Program. Support for Version 6 Only. Allowing SAS/SHARE Client Access to SAS Libraries or Files CHAPTER 40

Similar documents
Chapter 3 Managing Results in Projects. Chapter Table of Contents

UNIX Spawner Program. Starting the UNIX Spawner Program CHAPTER 36

SAS Support for TELNET on Windows

Using Cross-Environment Data Access (CEDA)

Chapter 6 Creating Reports. Chapter Table of Contents

UNIX Platform Error Messages

SAS I/O Engines. Definition. Specifying a Different Engine. How Engines Work with SAS Files CHAPTER 36

OS/390 Platform Examples

Introduction. LOCK Statement. CHAPTER 11 The LOCK Statement and the LOCK Command

Creating and Executing Stored Compiled DATA Step Programs

SAS File Management. Improving Performance CHAPTER 37

External Files. Definition CHAPTER 38

SAS Catalogs. Definition. Catalog Names. Parts of a Catalog Name CHAPTER 32

Chapter 25 PROC PARETO Statement. Chapter Table of Contents. OVERVIEW SYNTAX SummaryofOptions DictionaryofOptions...

Windows: SPX Access Method

OS/2: SPX Access Method

Data Set Options. Specify a data set option in parentheses after a SAS data set name. To specify several data set options, separate them with spaces.

Using Data Transfer Services

APPENDIX 2 Customizing SAS/ASSIST Software

CHAPTER 5 Macintosh: TCP/IP Access Method

Data Representation. Variable Precision and Storage Information. Numeric Variables in the Alpha Environment CHAPTER 9

Formats. Formats Under UNIX. HEXw. format. $HEXw. format. Details CHAPTER 11

What Is a Communications Access Method? CHAPTER 1 Using Communications Access Methods

Examples That Use Remote Objecting

SAS Data Libraries. Definition CHAPTER 26

Chapter 28 Saving and Printing Tables. Chapter Table of Contents SAVING AND PRINTING TABLES AS OUTPUT OBJECTS OUTPUT OBJECTS...

Optimizing System Performance

Using MDP Extensions. What Is the Multidimensional Data Provider? CHAPTER 3

Introduction to MDDBs

CHAPTER 13 Importing and Exporting External Data

from the source host, use the FTP put command to copy a file from the source host to the target host.

Chapter 14 Introduction to the FACTEX Procedure

Graphics. Chapter Overview CHAPTER 4

Storing and Reusing Macros

Using the SQL Editor. Overview CHAPTER 11

Macro Facility. About the Macro Facility. Automatic Macro Variables CHAPTER 14

Overview. CHAPTER 2 Using the SAS System and SAS/ ASSIST Software

Chapter 13 Multivariate Techniques. Chapter Table of Contents

Alternative ODS HTML Statements for Running Examples in Different Operating Environments

Informats. Informats Under UNIX. HEXw. informat. $HEXw. informat. Details CHAPTER 13

Chapter 15 Mixed Models. Chapter Table of Contents. Introduction Split Plot Experiment Clustered Data References...

Chapter 9 Selected Examples. Queues with Reneging

SAS/ASSIST Software Setup

SAS Web Infrastructure Kit 1.0. Overview

Chapter 23 Animating Graphs. Chapter Table of Contents ANIMATING SELECTION OF OBSERVATIONS ANIMATING SELECTED GRAPHS...347

The SERVER Procedure. Introduction. Syntax CHAPTER 8

OpenVMS Operating Environment

CHAPTER 7 Examples of Combining Compute Services and Data Transfer Services

Chapter 23 Introduction to the OPTEX Procedure

APPENDIX 4 Migrating from QMF to SAS/ ASSIST Software. Each of these steps can be executed independently.

Chapter 2 User Interface Features. networks Window. Drawing Panel

Licensing SAS DataFlux Products

Chapter 27 Saving and Printing Graphics

The EXPLODE Procedure

Locking SAS Data Objects

SAS. Installation Guide Fifth Edition Intelligence Platform

SAS 9.2 Foundation Services. Administrator s Guide

Routing the SAS Log and SAS Procedure Output

SAS Workflow Manager 2.2: Administrator s Guide

QUEST Procedure Reference

SAS Component Language (SCL) Interface to Agent Services

SCL Arrays. Introduction. Declaring Arrays CHAPTER 4

Tasks Menu Reference. Introduction. Data Management APPENDIX 1

SAS Web Infrastructure Kit 1.0. Overview, Second Edition

Installation Instructions for SAS Foundation for UNIX Environments

Enterprise Miner Software: Changes and Enhancements, Release 4.1

Chapter 28 INSET Statement. Chapter Table of Contents

DBLOAD Procedure Reference

SAS. IT Service Level Management 2.1: Migration Documentation

SAS Forecast Server 3.1. Administrator s Guide to Installation and Configuration

Routing Output. Producing Output with SAS Software CHAPTER 6

This chapter is recommended primarily for server administrators.

The correct bibliographic citation for this manual is as follows: SAS Institute Inc Proc EXPLODE. Cary, NC: SAS Institute Inc.

Administering SAS Enterprise Guide 4.2

Installation Instructions for SAS/ACCESS Interface to SAP BW

SAS Simulation Studio 14.1: User s Guide. Introduction to SAS Simulation Studio

Using Unnamed and Named Pipes

CHAPTER 7 Using Other SAS Software Products

SAS 9.4 Foundation Services: Administrator s Guide

Scheduling in SAS 9.2

Changes and Enhancements

Chapter 25 Editing Windows. Chapter Table of Contents

Introduction. CHAPTER 3 Working in the SAS Windowing Environment

The TRANTAB Procedure

Introduction. Getting Started with the Macro Facility CHAPTER 1

Chapter 28 Command Reference. Chapter Table of Contents TSVIEW COMMAND FORECAST COMMAND

Installation Instructions for Release 5.2 of the SAS Performance Management Solutions

SAS Drug Development 3.3_03. December 14, 2007

SAS Enterprise Guide 4.3

Defining Your Data Sources

The GTESTIT Procedure

Handling Exceptions. Introduction. Using the Program Halt Handler CHAPTER 10

Administrator for Enterprise Clients: User s Guide. Second Edition

User s Guide for SAS Software Navigator

Chapter 7 File Access. Chapter Table of Contents

Using CVS Repositories with SAS

SAS Drug Development. SAS Macro API 1.3 User s Guide

SAS AIX. Please Read Before Beginning Installation

SAS Financial Management 5.3: Installation and Configuration Guide

Introduction. Understanding SAS/ACCESS Descriptor Files. CHAPTER 3 Defining SAS/ACCESS Descriptor Files

Transcription:

499 CHAPTER 40 Permission Program Support for Version 6 Only 499 Allowing SAS/SHARE Client Access to SAS Libraries or Files 499 Permission Program Examples 500 Building the Permission Program 500 Testing the Permission Program 500 Support for Version 6 Only Note: Beginning with Version 7, SAS/SHARE uses the sasperm program that is automatically invoked to allow clients to access SAS libraries or files. However, information about the permission program is included here for Version 6 users. 4 Allowing SAS/SHARE Client Access to SAS Libraries or Files You may write and use the permission program on a SAS/SHARE server that is running on a UNIX host to allow clients to access SAS libraries or files. When presented with a validated userid, the server uses a customer-supplied program named permission to verify the following attributes: 3 user name 3 file or directory path for a SAS library or file 3 file or directory access permissions (read or write). The server invokes this program whenever a client tries to access a SAS library or file. The permission program determines whether or not the requesting user has the specified access to the file or directory. If the user has the appropriate access permissions, the program exits with a zero return code. If the user does not have the appropriate access permissions, the program exits with a non-zero return code. It is recommended that you write attempts, successes, and failures from the executable file to a log. Also, it is recommended that you fail the validation for any step in the process that has a problem. After you write and test the program, move it to the!sasroot /utilities/bin directory where SAS/SHARE expects the program to be located. Note: Methods for implementing file-access security vary across types of UNIX systems. Although many UNIX systems use conventional UNIX file-access permissions for owner, group, and other, some UNIX systems use different methods, such as Access Control Lists (ACLs). 4

500 Permission Program Examples 4 Chapter 40 In addition, SAS requires the user to have execute permission in order to access a directory that contains a SAS data library. For systems that use ACLs, ask your system administrator or software vendor for the correct methods to validate access on your system. The sample programs in the!sasroot /utilities/src directory verify a user s access rights by using both conventional UNIX permissions and ACLs. Permission Program Examples The!sasroot /utilities/src directory contains documented examples of the following permission programs: 3 perm.conv.c 3 perm.afsacl.c 3 perm.aixacl.c 3 perm.hpacl.c Each of these programs verifies a user s access rights using both conventional UNIX permissions and ACLs. The filename extension indicates the specific type of UNIX system and the type of permissions for which the programs were designed. For example, perm.aixacl.c specifies a permission program for an AIX UNIX system that uses ACLs. Building the Permission Program In most cases, the working examples can be built with the following commands: cd!sasroot/utilities/src cc -o permission perm.conv.c The cc command typically is the name of the C language compiler, but the command that you use on your system may be different. You do not need to set high optimization or to use an ANSI standard compiler to build the program because it already uses the standard C library functions for most of the work. See the README files for details about building the program on specific UNIX systems. Testing the Permission Program You can perform all testing outside the SAS/SHARE environment because the programs are stand- alone. The simplest way to test the programs is to look at the UNIX status variable in the UNIX shell. For example, using the C shell, you might test the permission program as follows: permission /usr/bass/abc.ssd01 bass R echo $status 0

Permission Program 4 Testing the Permission Program 501 A zero exit status means that user bass has read ( R) access to the file abc.ssd01. In the following test, because the exit status is non-zero, user joe does not have write access ( W) to the file abc.ssd01. permission /usr/joe/abc.ssd01 joe W echo $status 1 After you test the program and are satisfied that it works correctly, move the program to the!sasroot /utilities/bin directory where SAS/SHARE expects the program to be located.

502 Testing the Permission Program 4 Chapter 40

The correct bibliographic citation for this manual is as follows: SAS Institute Inc., Communications Access Methods for SAS/CONNECT and SAS/SHARE Software, Version 8, Cary, NC: SAS Institute Inc., 1999. pp. 643. Communications Access Methods for SAS/CONNECT and SAS/SHARE Software, Version 8 Copyright 1999 by SAS Institute Inc., Cary, NC, USA. ISBN 1 58025 479 9 All rights reserved. Printed in the United States of America. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, or otherwise, without the prior written permission of the publisher, SAS Institute Inc. U.S. Government Restricted Rights Notice. Use, duplication, or disclosure of the software by the government is subject to restrictions as set forth in FAR 52.227 19 Commercial Computer Software-Restricted Rights (June 1987). SAS Institute Inc., SAS Campus Drive, Cary, North Carolina 27513. 1st printing, September 1999 SAS and all other SAS Institute Inc. product or service names are registered trademarks or trademarks of SAS Institute Inc. in the USA and other countries. indicates USA registration. IBM, ACF/VTAM, AIX, APPN, MVS/ESA, OS/ 2, OS/390, VM/ESA, and VTAM are registered trademarks or trademarks of International Business Machines Corporation. indicates USA registration. Other brand and product names are registered trademarks or trademarks of their respective companies. The Institute is a private company devoted to the support and further development of its software and related services.