...
Windows | Although you may edit configuration files with any text editor (for example, Notepad), we recommend that you manage configuration options using the Universal Configuration Manager Control Panel application. Only user accounts in the Administrator group may execute the Universal Configuration Manager. |
---|
...
UNIX | UCMD Server requires read access to its installation directory and its working directory (defined in the component definition). If user security is activated, the Server requires root access to create processes that execute with another user's identity. The Server security identity is inherited from the Broker. If the Broker is running with a non-root user ID, then the Server program must have the set user ID on execution permission set and root as owner. See Universal Message Translator for details. |
---|---|
z/OS | UCMD Server for z/OS requires read access to its installation data sets and its HFS working directory (defined in the component definition). |
...
Windows | Windows provides two primary types of log on processes: batch and interactive. A user must be given the right to log on as a batch job for them to do a batch log on. All users can do an interactive log on. See the LOGON_METHOD option for more details. | |||||
---|---|---|---|---|---|---|
UNIX | Universal Command can use three different types of user authentication methods:
| |||||
HP-UX 11.00 and later | By default, supplemental group memberships are recorded in the /etc/group file. However, if an /etc/logingroup file exists, it governs all supplemental group memberships and effectively overrides the entries in /etc/group.
| |||||
IBM i | If the user name and password are successfully validated by the operating system, the Initiator program (UCMSINIT) changes the current user profile to the user profile of the user ID. |
...
For more information, see Universal Command - Command References.