Decwindows Motif for Openvms Management Guide

Decwindows Motif for Openvms Management Guide

VSI OpenVMS DECwindows Motif for OpenVMS Management Guide Document Number: DO-DDWMNH-01A Publication Date: October 2019 Revision Update Information: This is a new manual. Operating System and Version: VSI OpenVMS Integrity Version 8.4-1H1 VSI OpenVMS Alpha Version 8.4-2L1 Software Version: DECwindows Motif for OpenVMS Version 1.7F VMS Software, Inc., (VSI) Bolton, Massachusetts, USA DECwindows Motif for OpenVMS Management Guide: Copyright © 2019 VMS Software, Inc., (VSI), Bolton Massachusetts, USA Legal Notice Confidential computer software. Valid license from VSI required for possession, use or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor's standard commercial license. The information contained herein is subject to change without notice. The only warranties for VSI products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. VSI shall not be liable for technical or editorial errors or omissions contained herein. HPE, HPE Integrity, HPE Alpha, and HPE Proliant are trademarks or registered trademarks of Hewlett Packard Enterprise. The VSI OpenVMS documentation set is available on DVD. ii DECwindows Motif for OpenVMS Management Guide Preface ................................................................................................................................... vii 1. About VSI .................................................................................................................... vii 2. Intended Audience ........................................................................................................ vii 3. Document Structure ...................................................................................................... vii 4. Associated Manuals ...................................................................................................... vii 5. VSI Encourages Your Comments .................................................................................. viii 6. Conventions ................................................................................................................. viii Chapter 1. System Overview ................................................................................................ 1 1.1. The DECwindows Client/Server Processing Model ........................................................ 1 1.1.1. The Client ......................................................................................................... 2 1.1.2. The Transport .................................................................................................... 2 1.1.3. The Display Server ............................................................................................ 2 1.2. Optional Server Configurations ..................................................................................... 2 1.2.1. The Font Server ................................................................................................ 3 1.2.2. The Proxy Server .............................................................................................. 3 1.3. DECwindows Motif Components .................................................................................. 4 1.3.1. Layered Product Components ............................................................................. 4 1.3.2. Operating System Components ........................................................................... 5 Chapter 2. Starting DECwindows Motif ............................................................................. 7 2.1. Understanding the Startup Procedure ............................................................................. 7 2.2. Using the DECW$STARTUP.COM Procedure ............................................................. 11 2.3. System Startup Considerations .................................................................................... 11 2.3.1. Defining DECwindows System Logicals ........................................................... 11 2.3.2. Adjusting System Parameters ........................................................................... 12 Chapter 3. Configuring the Display Server ...................................................................... 15 3.1. Customizing the DECwindows Display Server ............................................................. 15 3.1.1. Using the DECW$PRIVATE_SERVER_SETUP File ......................................... 15 3.1.2. The Display Server Customization Parameters .................................................. 16 3.1.2.1. Server Process ...................................................................................... 19 3.1.2.2. Extensions ............................................................................................ 21 3.1.2.3. Security ................................................................................................ 23 3.1.2.4. Devices ................................................................................................ 25 3.1.2.5. Transport and Network Connections ...................................................... 30 3.1.2.6. Fonts .................................................................................................... 30 3.1.2.7. Keyboard .............................................................................................. 33 3.1.2.8. Mouse .................................................................................................. 36 3.1.2.9. Color Database ..................................................................................... 37 3.1.2.10. Screen Saver ....................................................................................... 37 3.1.2.11. Backing Store and Save Under ............................................................ 38 3.1.2.12. Error Reporting ................................................................................... 39 3.1.3. Setting Cluster-Common Parameters ................................................................. 42 3.1.4. Setting Standalone System Parameters .............................................................. 43 3.1.5. Determining the Current Server Parameters ....................................................... 43 3.1.5.1. Displaying the Server Logical Name Table ............................................. 43 3.1.5.2. Using the X Display Information Utility (xdpyinfo) ................................ 44 3.1.5.3. Using X Set Utility (xset) ...................................................................... 47 3.2. Specifying the Network Transports .............................................................................. 47 3.2.1. Using the Local Transport ................................................................................ 48 3.2.2. Using the DECnet Transport ............................................................................ 48 3.2.3. Using the TCP/IP Transport ............................................................................. 48 iii DECwindows Motif for OpenVMS Management Guide 3.2.4. Using the LAT Transport ................................................................................. 48 3.2.5. Changing the Default Transports ...................................................................... 49 3.3. Establishing Server Access Control ............................................................................. 49 3.3.1. User-Based Access Control .............................................................................. 49 3.3.2. Token-Based Access Control ............................................................................ 49 3.3.2.1. Magic Cookie ....................................................................................... 50 3.3.2.2. Kerberos ............................................................................................... 50 3.3.3. The X Authority File ....................................................................................... 51 3.3.4. The Access Allowed File ................................................................................. 52 3.3.5. The Access Trusted File ................................................................................... 52 3.3.6. Choosing an Access Control Method ................................................................ 52 3.3.6.1. Applying Access Control to Connections Outside a Desktop Session ........ 53 3.3.6.2. Applying Access Control to Connections Inside a Desktop Session .......... 53 3.3.7. Enabling User-Based Access Control ................................................................ 53 3.3.8. Enabling Magic Cookie Access Control ............................................................ 55 3.3.9. Enabling Kerberos Access Control ................................................................... 56 3.3.10. Using the Security Extension .......................................................................... 59 3.3.10.1. Enabling the Security Extension .......................................................... 59 3.3.10.2. Using the Security Policy File ............................................................. 59 3.4. Setting Up a Multihead System ................................................................................... 60 3.4.1. System Setup .................................................................................................

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    120 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us