fbpx
1-888-310-4540 (main) / 1-888-707-6150 (support) info@spkaa.com
Select Page

Using Unix and Windows Groups with ClearCase

windchill features best plm software
Written by SPK Blog Post
Published on August 23, 2011

In this week’s blog entry, we want to have a look at how Unix and Windows groups work together in a mixed Unix/Windows environment. This topic can sometimes be a bit confusing, and here we hope to contribute to clarifying the subject. Many companies and development teams have a mixed development environment, often using a Unix/Linux VOB server in combination with both Unix/Linux and Windows client machines. Getting this all to work is an important and practical topic.

In addition, Unix/Windows groups can be used to enforce code security. We tackle this topic as well, giving an example of what it takes to set this up. ClearCase at this time doesn’t have a robust formal method of enforcing code security, although IBM/Rational has said that something new will be included when ClearCase 8.0 is released. Be that as it may, today group permissions seems to be the most viable method of providing security.

Have a look at this example of using groups to enforce security, and then please comment on its usefulness to you.  SPK_WinUnixGroupPermissions

Latest White Papers

A Field Guide to Threat Vectors in the Software Supply Chain

A Field Guide to Threat Vectors in the Software Supply Chain

The software supply chain is made up of many integrated parts, people, and processes. The components range from tools and configurations to code libraries and systems. These components’ goals are developing and delivering software. Unfortunately, risks are high due to...

Related Resources

A Field Guide to Threat Vectors in the Software Supply Chain

A Field Guide to Threat Vectors in the Software Supply Chain

The software supply chain is made up of many integrated parts, people, and processes. The components range from tools and configurations to code libraries and systems. These components’ goals are developing and delivering software. Unfortunately, risks are high due to...

Breaking down Zero Trust Architecture for CI/CD Pipelines

Breaking down Zero Trust Architecture for CI/CD Pipelines

In recent years, remote work has become the norm for many organizations.  With workers all around the globe on different networks, cybersecurity risks are much higher.  System failures and hackers still pose risks even when working on the same network. All of these...

The Future of CAD with PTC Creo and Artificial Intelligence

The Future of CAD with PTC Creo and Artificial Intelligence

The seemingly endless debate of Artificial Intelligence's benefits and drawbacks has permeated all technological media. Why is this such a hot topic? The public wants to understand what AI can do, the technologies it can benefit, and what the future holds for AI....