Category : System Diagnostics for your computer
Archive   : PASSKEY.ZIP
Filename : PASSKEY.DOC

 
Output of file : PASSKEY.DOC contained in archive : PASSKEY.ZIP
















Passkey
Version 1.04
Copyright (C) 1987

By:

Rod Cullison

Security/Menu/Reporting

Reference Manual












Passkey is the sole property of Rod Cullison







TABLE OF CONTENTS



THE SHAREWARE CONCEPT . . . . . . . . . . . . . . . . . 1

WARRANTY . . . . . . . . . . . . . . . . . . . . . . . 1

INTRODUCTION . . . . . . . . . . . . . . . . . . . . . 2

ABOUT PASSKEY . . . . . . . . . . . . . . . . . . . . . 3

INSTALLATION . . . . . . . . . . . . . . . . . . . . . 4

SYSTEM CONFIGURATION . . . . . . . . . . . . . . . . . 5

APPLICATION MAINTENANCE . . . . . . . . . . . . . . . . 6
Add New Application to Menu . . . . . . . . . . . 6
Change an Application Profile . . . . . . . . . . 8
Browse Application Profiles . . . . . . . . . . . 8
Delete Application . . . . . . . . . . . . . . . . 8

USER MAINTENANCE . . . . . . . . . . . . . . . . . . . 9
Add a User to PassKey . . . . . . . . . . . . . . 9
Change a User Profile . . . . . . . . . . . . . . 10
Browse User Profiles . . . . . . . . . . . . . . . 10
Delete User . . . . . . . . . . . . . . . . . . . 10

CONFIGURATION . . . . . . . . . . . . . . . . . . . . . 11

ORDER FORM . . . . . . . . . . . . . . . . . . . . . . 12



PassKey Security/Menu/Reporting Page 1



THE SHAREWARE CONCEPT

This program is distributed for personal, private use and with
the understanding that if it is used and found to be of value,
the user will register with a contribution of $35. This action
will be appreci-ated and will encourage further development. Upon
receipt of registra-tion, a disk with the most recent version of
Passkey and any support pro-grams will be mailed to the user.

Commercial use without registration and licence is prohibited.

In any case, copy the program and share it with others.

For the convenience of corporate users and others, a printed
invoice is included at the end of this manual.



WARRANTY

Passkey is distributed as-is and without warranty, including,
but not limited to, the implied warranties of merchantability
and fitness for a particular purpose.

The user(s) of Passkey agree to hold the author and distributors
of this product harmless for any damages, either direct or
consequential, which arise from the use of this product.



PassKey Security/Menu/Reporting Page 2



INTRODUCTION


As the name implies, Passkey is a PC security system. My
intent when writing Passkey was to provide the needed security
for PC's in our company that are shared by several users. In my
search for the right system I found several security applica-
tions that locked the computer out to unauthorized users, but
once a user has signed on he/she is given full access to the
machine and resident software. There are also several good menu
systems that provide for limited security. My idea was to
develop a system that married all three aspects of security,
menuing, and reporting. Passkey allows a security administrator
to add users and provide only those applications that the user
needs. This way, when the user signs on he is presented with a
menu of the applications he has been given access to.

Passkey is currently being used extensively by a few
companies that I am affiliated with. One of which is a billion
dollar bank where the internal audit department has reviewed the
system and highly recommends it's use on all PC's in the bank.
Several of their recommendations have been incorporated into the
current release of Passkey, and others are forthcoming.

Passkey is not only for the large company although it
adapts well to their application. It is also a valuable tool for
the home PC. I use the product at home to protect my data and
programs from kids and other household members.




PassKey Security/Menu/Reporting Page 3



ABOUT PASSKEY


Passkey is a user oriented menu system that allows the
computer user to access the applications they want to work with
without the need to learn all the operating system commands that
may be involved in setting up and starting an application. This
method of user interface provides for more productive use of the
computer with less fear by the inexperienced user.

While being an aid to the new or casual user, PassKey also
has the flexibility to allow the seasoned computer user unre-
stricted access. To this type of user PassKey can be a real
productivity aid if used properly.

PassKey in no way is meant to restrict the "hacker". Since this
would be a superfluous effort and only provide the "hacker" with
a new challenge. Instead, with a properly configured computer
system, PassKey will provide the security to help protect
against destruction of files, etc. caused most often by the
confused user just trying to find his or her way.

Passkey contains no "hooks" into the operating system, but
instead runs as a well behaved application under PC-DOS and
MS-DOS.

PassKey is loaded with the MENU.BAT file included on the
distribution diskette. When the user signs on and selects an
option from the menu, PassKey generates a batch file for
execution of the desired application. This batch file is named
MENUOPT.BAT. PassKey then ends and the MENU.BAT file calls
MENUOPT.BAT. If the application was setup to return to passkey
upon completion, the MENUOPT.BAT file contains a call to
MENU.BAT and the cycle continues.

If the application is set to not return to PassKey then
when the MENUOPT.BAT file completes, the user will be at the
normal DOS prompt. I have included a small batch file called
M.BAT which should be placed in a directory that is always in
the current path. M.BAT does nothing more than call MENU.BAT to
return to PassKey.



PassKey Security/Menu/Reporting Page 4



INSTALLATION


Passkey is very simple to install. Just place the Passkey
disk-ette in drive A and type A:INSTALL or create a directory
called "\PASSKEY" on your hard disk and copy the distribution
files to it.

The INSTALL program will create a subdirectory on your hard
disk called PASSKEY, then copy the programs to this directory.

Several configuration options will be presented during
installa-tion. These should be self explanatory and there is
always a default option that will work in most situations. Refer
to the chapter entitled "CONFIGURATION" for more information.
Pressing "Enter" will always select the default on each option.

If all goes well you should be looking at a sign on screen.
This next step is CRITICAL. you will be signing on as the
security adminis-trator which allows you and only you to maintain
users and applications.

Sign on as CONTROL: Type CONTROL
(press return)
Enter the preset password: Type LETMEIN
(press return)

The system is now asking that you change the security
administra-tor's password. Type in any password of your choice
and press return. Just please be sure you can remember what you
typed since the only way to get in if you forget is to start
over from scratch.

Next, you are presented with a menu of control areas that
you will want to maintenance. I suggest that you begin with the
Applica-tion Maintenance since there would be no benefit to
having users with no applications.

The menus are such that you may make your selection by
using the arrow keys on the numeric keypad to highlight the
function desired or press the first letter of the function
description.

One more step in the installation that you should accom-
plish is to edit your AUTOEXEC.BAT file and include the follow-
ing statements at the end of the file:

CD \PASSKEY
MENU.BAT

You should now refer to the chapter dealing with the
function you selected.




PassKey Security/Menu/Reporting Page 5



SYSTEM CONFIGURATION


Passkey should work with any IBM PC/XT/AT/PS2 computer or
close compatible. It is primarily designed for computers with a
hard disk.

To take full advantage of Passkey's capabilities, your hard
disk should be divided into subdirectories. These should be
configured using one of the following methods:

Root ---+- Payroll
|
+- Spreadsheet
|
+- Database
|
+- Smith ---+- Payroll
| |
| +- Database
|
+- Jones ---+- Spreadsheet
|
+- Database


Root ---+- Payroll ---+- Smith
|
+- Spreadsheet ---+- Jones
|
+- Database ---+- Smith
|
+- Jones

The reason for this configuration will become clear when
you get to the section on application maintenance.









____________________

IBM is a registered trademark of International Business
Machines.

PC/XT/AT/PS2 are all registered trademarks of International
Business Machines Corporation.



PassKey Security/Menu/Reporting Page 6



APPLICATION MAINTENANCE


Select "Application" from the menu.

Add New Application to Menu.

Select "Add" from the menu.

The screen now contains a form for entering the infor-mation
required to add a new application.

Key
This is the information that will be displayed on your
menu for user selection.

Directory
This is the disk subdirectory that will be used by the
user for this application. Referring back to the
configuration of the disk directories; you will enter
a "+" symbol before or after the directory name to
specify the configuration you use on your system.
Entering "+\PAYROLL" will change the current directory
to C:\JONES\PAYROLL for user JONES. Entering "\PAY-
ROLL\+" will change the current directory to
C:\PAYROLL\JONES for user JONES. Of course the plus is
optional if you don't wish to have user directories.

Path
Use this field to set the DOS directory search path
that will be required for this application. An example
might be \PAYROLL;\DOS;\.

Program
Enter the name of the program you wish to execute for
this application. The name should be appended with
.COM, .EXE, or .BAT.

Parameters
This field should contain any command line parame-ters
that the program expects.

Execution Method
Enter one of either:
B - execute program via batch file.
D - execute program as a sub program of Passkey.
S - Shell to DOS from Passkey.

Note: Only the B)atch file is incorporated into this
shareware version.




PassKey Security/Menu/Reporting Page 7



Special Functions
These functions will be either Y)es or N)o.

Auto Sub Directory.
Tells Passkey whether to automatically append the
user id to the directory specified ("+" re-
quired).

Auto Backup.
If yes, Passkey will generate a BACKUP command at
the end of the batch file prior to returning. The
command is a normal DOS Backup for changed files
in the current directory.

Auto Return to Menu.
Should Passkey generate the necessary statements
to return after the program completes execution?
Normally yes.

Application Desc.
Enter a one line description of the application
to clarify the displayed menu item for the user.



PassKey Security/Menu/Reporting Page 8



Change an Application Profile.

Select "Change" from the menu.

The screen contains the application form with the
cursor positioned at the KEY field. Enter part or all
of the application key that you wish to change and
press enter.

Browse through Application Profiles.

You may browse through the database of applications by
selecting Next or Previous from the menu.

Delete Application.

Select "Delete" from the menu.

Selecting this option will delete the current applica-
tion record that is displayed from the application
database. A message will be displayed asking you to
verify the delete prior to actually deleting the
record. An error message will occur if you attempt to
delete an application that is still active for any
user.

That is all there is to maintaining the applications for
your system. The section on User Maintenance will show you how
to connect the different application(s) to your users for their
menu.



PassKey Security/Menu/Reporting Page 9



USER MAINTENANCE

This section is used to add or change user profiles. A user
must be set up in the user database prior to signing on to the
PassKey system.

Select "User Profile" from the menu.

Adding a new user to PassKey:

Select "Add" from the menu.

The screen now contains a form for entering information
about the user you wish to add.

User Id
This is the name which the user will be known to
PassKey. This name must be unique for each user.
Referring back to the directory configuration, this is
also the name PassKey will use for the subdirectory of
the application for this user.

Password
This is where you will assign a temporary password for
the user. The password is temporary because PassKey
recognizes when the user profile is added or changed
and requests the user to select their own password
upon initial sign on. any time you add or change a
user profile you must change this field. This way the
user is informed of any changes to his/her profile.

Applications
Mark each application that the user should have access
to by entering a Y or N next to each application.

That's all there is to adding a new user to PassKey.



PassKey Security/Menu/Reporting Page 10



Change a User Profile.

Select "Change" from the menu.

The screen contains the User Maintenance form with the
cursor positioned at the User Id field. Enter the user id
of the user profile you wish to change.

You may now make whatever changes you wish to make for the
user you have selected.

Remember! You must change the user's password or he/she
will not be allowed to sign on anymore.

Browse through User Profiles.

You may browse through the user database by selecting the
Next and Previous options from the menu.

All information for each user will be displayed except for
the password. Passkey will allow you to change a user's
password, but never view it.

Delete User.

Select "Delete" from the menu.

Selecting this option will delete the currently displayed
user profile from the database. A message will be displayed
asking for verification of the delete prior to updating the
database.



PassKey Security/Menu/Reporting Page 11



CONFIGURATION


Passkey allows you to reconfigure several options such as
menu title, timeout delay, and screen colors. These options may
be changed at any time by the PassKey administrator.

Sign on as "CONTROL"

Select "Configure" from the menu.

Title
This is the centered title that appears on the menu
selection screen.

Path for files
This option is used primarily for sub-menus which are
not available in the shareware version of Passkey
today.

Timeout value
this is the number of minutes PassKey will wait with
no keyboard activity before forcing the user off or
blanking the screen.

Maximum password attempts
This is the total number of tries a user has to enter
his/her password before PassKey forces them off and
logs a security violation.

Note: The following options will only appear if you are
using a color monitor.

Frame color
Use the right and left arrow keys on the numeric
keypad to select the menu frame color desired. The up
and down arrow keys will toggle between high and low
intensity.

Text color
Select the foreground/background color combination
that best suits you. All menus and screens in PassKey
will be displayed in the colors you select. Use the
arrow keys on the numeric keypad to position to the
color desired, then press enter.

Passkey is now configured for the environment you have
selected.



PassKey Security/Menu/Reporting Page 12



PassKey Registration


Please register PassKey to the following individual or
company. We will require ____ copies of the program and have
enclosed $__________ for each copy to be used.

**************************************************************

_____ Registration only . . . . . . . . . . . . . $35.00

_____ Registration and newest release disk . . . $50.00

_____ Update of newest PassKey release . . . . . $15.00
(Must be a registered user of PassKey)

**************************************************************

Name: _____________________________________________

Company: _____________________________________________

Address: _____________________________________________

_____________________________________________

City: _________________________ State: __________

Zip: _______________

I obtained my copy of PassKey from: __________________


Send to: Rod Cullison
P.O. Box 1305
Albuquerque, NM 87120