WASD VMS Web Services - Install and Config

3 - Server Account and Environment

3.1 - VMS Server Account 3.2 - VMS Scripting Account 3.3 - Account Support Files 3.4 - Global Pages/Sections 3.5 - Logical Names 3.5.1 - WASD Name Table 3.5.2 - Pre-v10 3.6 - Server Startup
next previous contents full-page

The HTTP server account should be a standard account, preferably in a group of its own (definitely at least a non-system, non-user group), with sufficient quotas to handle the expected traffic.

Process Quotas!

Server process quotas must be sufficient to support the expected traffic load. BYTLM in particular, and then BIOLM, DIOL, FILLM and PGFLQUO, are all considerations.


Symptoms of insufficient process quotas include:

A general rule is more is better, after all, it will only use as much as it needs! To assist with setting a reasonable BYTLM quota the WATCH report (see "WASD VMS Web Services - Features and Facilities"; 10 - WATCH Facility WASD Web Services - Features and Facilities ) provides some feedback on server BYTLM usage.
TCP/IP Agent Resources!

On an associated topic; some TCP/IP agents require particular internal resources to be adjusted against given loads (e.g. buffer space allocations). Symptoms of resource starvation may be TCP/IP services, including WASD, "pausing" for significant periods or associated processes entering miscellaneous wait states, etc., during processing. Please ensure such TCP/IP agents are appropriately dimensioned for expected loads.

Later versions of TCP/IP Services for OpenVMS seem to have large default values for socket send and receive buffers. MultiNet and TCPware are reported to improve transfer of large responses by increasing low default values for send buffer size. The WASD global configuration directives [SocketSizeRcvBuf] and [SocketSizeSndBuf] allow default values to be adjusted. WATCH can be used to report network connection buffer values.


3.1 - VMS Server Account

The following provides a guide to the account.

Username: HTTP$SERVER                      Owner:  WASD Server
Account:  HTTPD                            UIC:    [077,001] ([HTTP$SERVER])
CLI:      DCL                              Tables: DCLTABLES
Default:  WASD_ROOT:[HTTP$SERVER]
LGICMD:   LOGIN
Flags:  Restricted DisNewMail
Primary days:   Mon Tue Wed Thu Fri
Secondary days:                     Sat Sun
Primary   000000000011111111112222  Secondary 000000000011111111112222
Day Hours 012345678901234567890123  Day Hours 012345678901234567890123
Network:  ##### Full access ######            ##### Full access ######
Batch:    ##### Full access ######            ##### Full access ######
Local:    -----  No access  ------            -----  No access  ------
Dialup:   -----  No access  ------            -----  No access  ------
Remote:   -----  No access  ------            -----  No access  ------
Expiration:            (none)    Pwdminimum:  6   Login Fails:     0
Pwdlifetime:         90 00:00    Pwdchange:      (pre-expired)
Last Login:            (none) (interactive), 11-MAY-1995 08:44 (non-interactive)
Maxjobs:         0  Fillm:       300  Bytlm:      5000000
Maxacctjobs:     0  Shrfillm:      0  Pbytlm:           0
Maxdetach:       0  BIOlm:      2048  JTquota:       1024
Prclm:         100  DIOlm:      1024  WSdef:         1000
Prio:            4  ASTlm:      2000  WSquo:         5000
Queprio:         0  TQElm:       100  WSextent:     20000
CPU:        (none)  Enqlm:       256  Pgflquo:     500000
Authorized Privileges:
  NETMBX    TMPMBX
Default Privileges:
  NETMBX    TMPMBX

3.2 - VMS Scripting Account

The following provides a guide to the account.

Username: HTTP$NOBODY                      Owner:  WASD Scripting
Account:  HTTPD                            UIC:    [076,001] ([HTTP$NOBODY])
CLI:      DCL                              Tables: DCLTABLES
Default:  WASD_ROOT:[HTTP$NOBODY]
LGICMD:   LOGIN
Flags:  Restricted DisNewMail
Primary days:   Mon Tue Wed Thu Fri
Secondary days:                     Sat Sun
Primary   000000000011111111112222  Secondary 000000000011111111112222
Day Hours 012345678901234567890123  Day Hours 012345678901234567890123
Network:  ##### Full access ######            ##### Full access ######
Batch:    ##### Full access ######            ##### Full access ######
Local:    -----  No access  ------            -----  No access  ------
Dialup:   -----  No access  ------            -----  No access  ------
Remote:   -----  No access  ------            -----  No access  ------
Expiration:            (none)    Pwdminimum:  6   Login Fails:     0
Pwdlifetime:         90 00:00    Pwdchange:      (pre-expired)
Last Login:            (none) (interactive), 11-MAY-1995 08:44 (non-interactive)
Maxjobs:         0  Fillm:       300  Bytlm:       500000
Maxacctjobs:     0  Shrfillm:      0  Pbytlm:           0
Maxdetach:       0  BIOlm:      2048  JTquota:       1024
Prclm:         100  DIOlm:      1024  WSdef:         1000
Prio:            4  ASTlm:      2000  WSquo:         5000
Queprio:         0  TQElm:       100  WSextent:     20000
CPU:        (none)  Enqlm:       256  Pgflquo:     500000
Authorized Privileges:
  NETMBX    TMPMBX
Default Privileges:
  NETMBX    TMPMBX

3.3 - Account Support Files

NOTE

Support procedures often change between versions. It is always advisable to check the versions documentation before installing or updating. Examples may be found in WASD_ROOT:[EXAMPLE].

HTTPd Executables

Two server executables can be built by the package.

Privileged Image

As the HTTP$SERVER account should be completely unprivileged, and the HTTPd image requires ALTPRI, CMKRNL, DETACH, NETMBX, TMPMBX, PRMGBL, PRMMBX, PSWAPM, SECURITY, SHMEM (VAX only), SYSGBL, SYSLCK, SYSNAM, SYSPRV and WORLD privileges (see the WASD_ROOT:[SRC.HTTPD]READMORE.TXT document for a description of how and why the server uses these privileges).

It is installed using a command similar to the following:

$ INSTALL = "$SYS$SYSTEM:INSTALL/COMMAND_MODE"
$ INSTALL ADD WASD_EXE:HTTPD.EXE -
  /PRIVILEGE=(ALTPRI,CMKRNL,DETACH,PRMGBL,PRMMBX,PSWAPM,-
              SECURITY,SYSGBL,SYSLCK,SYSNAM,SYSPRV,WORLD) 

STARTUP.COM

Putting all this together the HTTP server startup procedure becomes something similar to the supplied example. It should be called from SYSTARTUP_VMS.COM or the site's equivalent.

This procedure will support simple and quite complex sites. It works closely with STARTUP_SERVER.COM (see below). It is designed to accept parameters from the command-line or as pre-assigned symbols. Operating this way requires no modifications to the procedure itself. Startup characteristics are essentially determined by DCL symbol values. Some symbols are booleans, switching functionality off and on, others require string values. When relevant startup values are not assigned a reasonable default will be applied. See the following examples.

Startup characteristics can be determined by supplying symbol assignment values as command-line parameters when calling the procedure.

$ @DKA0:[WASD_ROOT.STARTUP]STARTUP WASD_DECNET=1 WASD_SSL=1 -
WASD_SSL_CERTIFICATE="WASD_ROOT:[LOCAL]ALPHA.PEM"

Startup characteristics can also be determined by assigning the symbol values before calling the procedure itself.

$ WASD_DECNET = 1
$ WASD_SSL = 1
$ WASD_SSL_CERTIFICATE = "WASD_ROOT:[LOCAL]ALPHA.PEM"
$ @DKA0:[WASD_ROOT.STARTUP]STARTUP

On VAX platforms prior to VMS V6.2 the startup uses a system batch queue. By default SYS$BATCH is used. An alternate queue can be specified.

$ @DKA0:[WASD_ROOT.STARTUP]STARTUP WASD_DECNET=1 WASD_BATCH_QUEUE=THIS$BATCH

Check the procedure itself for detail on symbol names and functionality.

See WASD_ROOT:[EXAMPLE]STARTUP.COM

STARTUP_LOCAL.COM

This file is automatically executed by the STARTUP.COM procedure immediately before the server is actually started. It is provided to supply all the local site's additional startup requirements. For example, a STARTUP.COM defined logical name could be modified here before the server proper is actually started.

See WASD_ROOT:[EXAMPLE]STARTUP_LOCAL.COM

STARTUP_SERVER.COM

This procedure serves two purposes.

  1. Server startup:
  2. The procedure then controls the activation of the HTTPd executable image during server restarts and exits.

See WASD_ROOT:[EXAMPLE]STARTUP_SERVER.COM

It is recommended to pass server startup command-line parameters using the WASD_SERVER_STARTUP logical name that this procedure checks for and uses if present. If this is defined the contents are applied to the server image when executed. It can be explicitly defined before WASD startup.

$ DEFINE /SYSTEM /EXECUTIVE WASD_STARTUP_SERVER "/SYSUAF=ID"
$ @DKA0:[WASD_ROOT.STARTUP]STARTUP

The value can also be passed to the main startup procedure in a symbol. The startup procedure then defines a system logical name with that value (note that any quotes used must be escaped).

$ WASD_DECNET = 1
$ WASD_SSL = 1
$ WASD_SSL_CERTIFICATE = "WASD_ROOT:[LOCAL]ALPHA.PEM"
$ WASD_STARTUP = "/SYSUAF=ID"
$ @DKA0:[WASD_ROOT.STARTUP]STARTUP

It can also be manually redefined at any time and the server restarted to apply different startup parameters to the running server.

$ DEFINE /SYSTEM /EXECUTIVE WASD_STARTUP_SERVER "/SYSUAF=(SSL,ID)"
$ HTTPD /DO=RESTART=NOW

3.4 - Global Pages/Sections

Various accounting, cache and other shared data used by the server is provided by shared global memory. These requires one permananet global section (SYSGEN parameter GBLSECTIONS) and a number of permanent global pages (SYSGEN parameter GBLPAGES) per item. The number of items varies depending on configuration.

Global Sections
ItemDescriptionUsage
AccountingAccumulates various data provided to the Server Administration Statistics report and the HTTPMON utilityrequired
ActivityProvides data to the Server Administration Activity Report graphrequired
AuthenticationWhen multiple WASD Instances are configured provides a shared authentication cacheoptional
Proxy VerificationWhen multiple WASD Instances are configured provides an shared proxy verification cacheoptional
SSL Session CacheWhen SSL is used and multiple WASD Instances are configured provides a shared SSL session cacheoptional

If there are insufficient global sections or pages the server will fail to start for all requirements except the activity statistics, this will just be disabled. Server process log startup messages advise on current usage.

As permanent, system-accessible global sections are deployed it may be necessary to explicitly delete them after ad hoc server experimentation, etc. (3.6 - Server Startup). The startup qualifier /GBLSEC=NOPERM disables the creation of permanent global sections eliminating this requirement.

3.5 - Logical Names

WASD version 10 uses an independent logical name table (something previous versions did not, see 3.5.1 - WASD Name Table below) and a different logical naming schema to earlier versions.

The following logical names are used in the operation of the package. These are usually created by STARTUP.COM during server startup.

Package Logical Names
Logical NameTableDescriptionPre-v10 Equivalent
CGI-BINWASD(Hyphen) System logical defining a search list with the architecture-specific executable directory first, local script directory second, then the common script directory, as a concealed device.same
CGI_BINWASDDirectory containing architecture-neutral script files.same
CGI_EXEWASDDirectory containing architecture-specific script executables.same
HT_EXEWASDPre-v10.0 backward compatibility for WASD_EXE.same
HT_LOGSWASDPre-v10.0 backward compatibility for WASD_LOG.same
HT_ROOTSYSTEMPre-v10.0 backward compatibility for WASD_ROOT.same
HT_SCRATCHWASDPre-v10.0 backward compatibility for WASD_SCRATCH.same
WASD_AXPWASDDirectory containing Alpha executable images (WASD_ROOT:[AXP]).HT_AXP **
WASD_AUTHWASDDirectory containing authentication/authorization databases (files, (WASD_ROOT:[LOCAL])).none
WASD_CGI_AXPWASDDirectory containing Alpha script executables (WASD_ROOT:[AXP-BIN]).CGI_AXP
WASD_CGI_IA64WASDDirectory containing Itanium script executables (WASD_ROOT:[IA64-BIN]).CGI_IA64
WASD_CGI_VAXWASDDirectory containing VAX script executables (WASD_ROOT:[VAX-BIN]).CGI_VAX
WASD_CONFIGWASDLocation of the configuration files. Can be defined as a search list.none
WASD_CONFIG_AUTHWASDLocation of the authentication/authorization configuration file.HTTPD$AUTH
WASD_CONFIG_GLOBALWASDLocation of the configuration file.HTTPD$CONFIG
WASD_CONFIG_MAPWASDLocation of the mapping rule file.HTTPD$MAP
WASD_CONFIG_MSGWASDLocation of the message file.HTTPD$MSG
WASD_CONFIG_SERVICEWASDLocation of the optional service (virtual host) configuration file.HTTPD$SERVICE
WASD_DECNET_CGI_OBJECTSYSTEM Locates the supporting DCL procedure. DECnet objects are system-global.none
WASD_DECNET_OSU_OBJECTSYSTEM Locates the supporting DCL procedure. DECnet objects are system-global.none
WASD_EXEWASDDirectory containing the executable images.HT_EXE **
WASD_FILE_DEV[n]SYSTEM Locates the DCL procedure that will integrate the specified environment's logical name table into the processes' LNM$FILE_DEV (see above).none
WASD_GMTWASDOffset from GMT (e.g. "+10:30", "-01:15") For systems supporting DTSS (e.g. DECnet-Plus) this logical may be left undefined, with server time being calculated using the SYS$TIMEZONE_DIFFERENTIAL logical.HTTPD$GMT
WASD_IA64WASDDirectory containing Itanium executable images.HT_IA64
WASD_LOGWASDIf logging is enabled and no log file name specified on the command line, this logical must be defined to locate the file. When a logging period is in use this logical need only contain the directory used to store the logs.HT_LOG
WASD_LOGSWASDOptional definition, for convenient log file specification.HT_LOGS **
WASD_ROOTSYSTEMLocation of WASD Web Services directory tree, as a concealed device.HT_ROOT **
WASD_SCRATCHWASDLocation of an optional directory that scripts can use for temporary storage. Must be read+write+delete accessible to the server account. The WASD_CONFIG_GLOBAL [DclCleanupScratchMinutesMax] directive controls whether automatic cleanup scans of this area delete any files that are older than [DclCleanupScratchMinutesOld].HT_SCRATCH **
WASD_SITELOGWASDLocation of the optional plain-text site log file.HTTPD$SITELOG
WASD_SSL_CAFILEWASDWhen using the SSL executable this logical locates the optional Certificate Authority list file.HTTPD$SSL_CAFILE
WASD_SSL_CERTWASDWhen using the SSL executable this logical locates the default certificate.HTTPD$SSL_CERT
WASD_SERVER_LOGSWASDLocation of the server process logs.HT_SERVER_LOGS **
WASD_STARTUP_SERVERWASDUsed to pass parameters to the server image startup command line.HTTPD_STARTUP_SERVER
WASD_VAXWASDDirectory containing VAX executable images.HT_VAX **
   **provided for backward compatibility

3.5.1 - WASD Name Table

In an effort to localise WASD-related logical names and avoid polluting the SYSTEM logical name table WASD version 10 creates it's own world-readable, system-writable name table, and adds it to LNM$SYSTEM_DIRECTORY.

$ SHOW LOGICAL WASD_TABLE/TABLE=LNM$SYSTEM_DIRECTORY
   "WASD_TABLE" [table] = "" (LNM$SYSTEM_DIRECTORY)

WASD logical names are then defined in that table leaving the SYSTEM table with just a few essential names.

$ SHOW LOGICAL CGI*,HT*,WASD*,WWW*

(LNM$PROCESS_TABLE)

(LNM$JOB_81E3D580)

(WASD_TABLE)

  "CGI-BIN" = "DKA0:[WASD_ROOT.CGI-BIN.]"
        = "DKA0:[WASD_ROOT.AXP-BIN.]"
  "CGI_BIN" = "WASD_ROOT:[CGI-BIN]"
  "CGI_EXE" = "WASD_ROOT:[AXP-BIN]"
  "HTBIN" = "CGI-BIN:[000000]"
  "HT_CACHE_ROOT" = "DKA0:[HT_CACHE.]"
  "HT_EXE" = "WASD_ROOT:[AXP]"
  "HT_LOGS" = "WASD_ROOT:[LOG]"
  "HT_SCRATCH" = "WASD_ROOT:[SCRATCH]"
  "WASD_AUTH" = "WASD_ROOT:[LOCAL]"
  "WASD_AXP" = "WASD_ROOT:[AXP]"
  "WASD_CACHE_ROOT" = "DKA0:[HT_CACHE.]"
  "WASD_CGILIBSHR32" = "CGI_EXE:CGILIBSHR32.EXE"
  "WASD_CGI_AXP" = "WASD_ROOT:[AXP-BIN]"
  "WASD_CGI_BIN" = "WASD_ROOT:[CGI-BIN]"
  "WASD_CGI_EXE" = "WASD_ROOT:[AXP-BIN]"
  "WASD_CGI_IA64" = "WASD_ROOT:[IA64-BIN]"
  "WASD_CGI_VAX" = "WASD_ROOT:[VAX-BIN]"
  "WASD_CONFIG" = "WASD_ROOT:[LOCAL]"
  "WASD_CONFIG_AUTH" = "WASD_CONFIG:HTTPD$AUTH.CONF"
  "WASD_CONFIG_GLOBAL" = "WASD_CONFIG:HTTPD$CONFIG.CONF"
  "WASD_CONFIG_MAP" = "WASD_CONFIG:HTTPD$MAP.CONF"
  "WASD_CONFIG_MSG" = "WASD_CONFIG:HTTPD$MSG.CONF"
  "WASD_CONFIG_SERVICE" = "WASD_CONFIG:HTTPD$SERVICE.CONF"
  "WASD_EXE" = "WASD_ROOT:[AXP]"
  "WASD_HTTPD_EXE" = "WASD_EXE:HTTPD_SSL.EXE"
  "WASD_IA64" = "WASD_ROOT:[IA64]"
  "WASD_JAVA" = "WASD_ROOT:[JAVA]"
  "WASD_LOCAL" = "WASD_ROOT:[LOCAL]"
  "WASD_LOGS" = "WASD_ROOT:[LOG]"
  "WASD_SCRATCH" = "WASD_ROOT:[SCRATCH]"
  "WASD_SCRIPT" = "WASD_ROOT:[SCRIPT]"
  "WASD_SCRIPT_LOCAL" = "WASD_ROOT:[SCRIPT_LOCAL]"
  "WASD_SERVER_LOGS" = "WASD_ROOT:[LOG_SERVER]"
  "WASD_SSL_CAFILE" = "WASD_CONFIG:CA-BUNDLE_CRT.TXT"
  "WASD_SSL_CERT" = "WASD_CONFIG:HTTPD.PEM"
  "WASD_STARTUP" = "WASD_ROOT:[STARTUP]"
  "WASD_STARTUP_SERVER" = "/SYSUAF=(ID,SSL)/PERSONA=RELAXED/PROFILE"
  "WASD_VAX" = "WASD_ROOT:[VAX]"
  "WWW_ROOT" = "DKA0:[WASD_ROOT.SRC.OSU]"
  "WWW_SCRIPT_MAX_REUSE" = "999"

(LNM$GROUP_000001)

(LNM$SYSTEM_TABLE)

  "HT_ROOT" = "DKA0:[WASD_ROOT.]"
  "WASD_DECNET_CGI_OBJECT" = "DKA0:[WASD_ROOT.CGI-BIN]CGIWASD.COM"
  "WASD_DECNET_OSU_OBJECT" = "DKA0:[WASD_ROOT.CGI-BIN]WWWEXEC.COM"
  "WASD_FILE_DEV" = "DKA0:[WASD_ROOT]WASD_FILE_DEV.COM"
  "WASD_ROOT" = "DKA0:[WASD_ROOT.]"

(LNM$SYSCLUSTER_TABLE)

(DECW$LOGICAL_NAMES)

As can be seen the number of LNM$SYSTEM_TABLE names is small, five in this example (though it can vary). Logical name WASD_FILE_DEV locates a procedure to insert the WASD_TABLE into a process' LNM$FILE_DEV to make the table names available. Until that is done they are not visible without an explicit /TABLE=WASD_TABLE. The server automatically uses the procedure for itself and scripting processes. Site admins can simply

$ @WASD_FILE_DEV
at the command-line or in their LOGIN.COM to have it done for their interactive session(s). This procedure location is variable within the file-system and needs to be located and accessed without initially knowing that location.

The WASD_ROOT logical provides a convenient, global logical location for the primary (default) WASD environment. HT_ROOT is used to provide pre-v10 backward-compatibility with existing sites. (If yours does not need the name you can deassign it during server startup.)

The WASD_DECNET_CGI_OBJECT and WASD_DECNET_OSU_OBJECT names provide global locations for the two DECnet scripting environments. These logicals are defined when a site uses the [STARTUP]STARTUP_DECNET.COM procedure. It is necessary to provide a global location for these with multiple WASD environments because DECnet objects are global entities. The one object must provide an infrastructure for potentially multiple WASD environments.

Other SYSTEM logical names, WASD_TABLEn name tables, and WASD_FILE_DEVn logical names are used for non-primary WASD environments (see "WASD VMS Web Services - Features and Facilities"; 8 - Instances and Environments WASD Web Services - Features and Facilities ).

3.5.2 - Pre-v10

The server code accepts both the v10 or later and pre-v10 schemas. If it cannot find a v10 logical name it attempts to use a pre-v10 logical name. This has been provided in an effort to make the transition as seamless as possible for existing sites. In addition the revised startup procedures configure and use WASD_TABLE but can be directed to use the SYSTEM table by STARTUP.COM being provided a WASD_TABLE=0 parameter (see STARTUP.COM).

$ WASD_TABLE = 0
$ @DKA0:[WASD_ROOT.STARTUP]STARTUP.COM

3.6 - Server Startup

When starting up the server several characteristics of the server may be specified using qualifiers on the command line. If not specified appropriate defaults are employed. For recommended methods of passing parameters to the executable at server startup see STARTUP_SERVER.COM. For clarity some esoteric and legacy qualifiers and parameters are not listed in this table.

Server Image Command-Line Parameters
Parameter/QualifierDescription
/ALL[=integer]Has two roles. When starting a server up assigns that server to a specific, non-default WASD environment (see /ENVIRONMENT) When using the server control /DO= using /ALL specifies to do the action to all servers in that particular environment.
/AUTHORIZATION=..Control authentication and authorisation behaviour. See "WASD VMS Web Services - Features and Facilities"; 3.2 - Authentication Policy WASD Web Services - Features and Facilities QUOTE>(WASD Web Services - Features and Facilities)
/CGI_PREFIX=The prefix to the CGI symbol names created for a script (defaults to "WWW_"). See "WASD Web Services - Scripting"; 2 - CGI WASD Web Services - Scripting QUOTE>(WASD Web Services - Scripting)
/CLUSTERApply control /DO= to all instances in a cluster (default is to current node instance(s) only).
/DETACH=This qualifier allows a DCL procedure to be specified as input to a directly detached process (in conjunction with /USER).
/DO=Command to be performed by the executing server.
/ENVIRONMENT=Integer indicating in which environment this server is executing
/GBLSEC=DELETEAllows a monitor-associated permanent global section to be explicitly deleted. When a server starts it creates system-accessible, permanent global sections in which to store accounting and request data. As this is permanent it would be possible for a site, perhaps experimenting with servers over a range of ports, to consume significant amounts of global pages and sections. This qualifier allows such sections to be deleted.
/GBLSEC=NOPERMDisables the creation of permanent global sections. They are automatically deleted when the server image exits.
/[NO]LOG[=name]Either disables logging (overrides configuration directive), or enables logging and optionally specifies the log file name (also see section 3.5 - Logical Names, logging is disabled by default). If the file specification is "SYS$OUTPUT" the server issues log entries to <stdout>, allowing user-defined log formats to be easily checked and refined.
/NETWORKRun the server and any scripting processes as NETWORK mode rather than the default detached OTHER mode.
/NOTE=stringAnnotate the server process log with the specified string. Intended to assist auditing server events such as restarts, maaping reloads and the like.
/PERSONA[=..] Enables and controls detached process scripting. See "WASD Web Services - Scripting"; 1 - Introduction WASD Web Services - Scripting WASD Web Services - Scripting
/PRIORITY=Server process priority (default is 4).
/[NO]PROFILEAllows SYSUAF-authenticated username security profiles to be used for file access.
/PROMISCUOUS[=password]Server will accept any authentication username/password pair (used for testing, demonstrations, etc.)
/PROXY=stringAllows proxy maintainance activities to be executed from the command line (e.g. from batch jobs, etc.).
/SCRIPT=AS=usernameSpecifies the username of the default scripting account.
/SERVICE=Comma-separated, list of server services (overrides the [Service] configuration parameter).
/SOFTWARE=An arbitrary string that can be used to override the server software identification (i.e. "HTTPd-WASD/10.4.0 OpenVMS/AXP SSL").
/[NO]SSL[=..]Controls Secure Sockets Layer protocol behaviour. See "WASD VMS Web Services - Features and Facilities"; 4 - Transport Layer Security WASD Web Services - Features and Facilities QUOTE>(WASD Web Services - Features and Facilities)
/[NO]SYSUAF[=..]Controls VMS (SYSUAF) authentication/authorisation behaviour. See "WASD VMS Web Services - Features and Facilities"; 3.10 - SYSUAF-Authenticated Users WASD Web Services - Features and Facilities QUOTE>(WASD Web Services - Features and Facilities)
/USER=usernameFor VMS 6.2 and later this qualifier allows the /DETACH qualifier to directly create a detached process executing as the specified username.
/VALBLK[=16|64]For server to (try) to use either pre-VMS V8.2 16 byte lock value block or the VMS V8.2 and later 64 byte lock value block.
/VERSIONDisplays the executable's version string and the copyright notice.
/[NO]WATCH[=..]Controls the use of the WATCH reporting facility. See "WASD VMS Web Services - Features and Facilities"; 10.6 - Command-Line Use WASD Web Services - Features and Facilities QUOTE>(WASD Web Services - Features and Facilities)


next previous contents full-page