Chapter Contents |
Previous |
Next |
Communications Access Methods for SAS/CONNECT and SAS/SHARE Software |
The PC spawner program is stored on the remote host in the !sasroot\CONNECT\SASEXE directory. Start the spawner program from the !sasroot directory.
The syntax for the command to invoke the PC spawner program is
SPAWNER<-ADAPTER
n>
|
Note: This option applies only to the NetBIOS access
method.
For Version 8, you are not limited to specifying a single NT domain by means of the -AUTHSERVER option. Instead, you may bypass this option and specify the domain name in the form domain\username when you supply your username to the Windows NT environment. Here are examples of how you might specify this information:
%let tcpsec=apex\bass.time2go #Versions 6 and 7 signon user=apex\bass password=time2go; #Version 8
Domain name
apex
identifies the location of the user authentication database. Username
bass
and password
time2go
will be verified against those in the
identified domain's username and password database.
Note: This option is valid for Windows NT only.
Note: Be sure to stop the spawner program service before you
delete it.
Note: This option is valid for Windows NT only.
Note: The Novell requestor for OS/2
does not support the -DRIVER option.
Note: This option
applies only to the MNetBIOS access method and is valid on OS/2 only.
To invoke SAS from a directory that is not the default location, to specify different SAS invocation options, or to execute other statements before invoking SAS, use the -FILE or -FILEPROMPT option (the -FILEPROMPT option is discussed later).
For Windows NT and Windows 95, the following options are supplied by default when you invoke SAS:
-DMR -COMAMID access-method -NOLOGO -ICON
For OS/2, the following options are supplied by default when you invoke the spawner:
-DMR -COMAMID access-method -NOLOGO -ICON
For Windows NT or Windows 95, the alternate file will be a batch file that is signified by the .BAT extension. For OS/2, the alternate file will be a command file that is signified by the .CMD extension.
Your batch file must contain the following two lines:
cd \sas /*or other path to the sas.exe file */ sas.exe %1 %2 %3 %4 %5 %6 %7 %8 %9 /* and any additional options */
The first line changes to the directory where the SAS executable is stored. The second line invokes SAS. Add options as needed at this SAS invocation.
With OS/2, you can use a REXX command file that contains statements in the following format:
/* Invoke remote SAS session */ parse arg parameters 'drive:\path\file-name.ext SAS-options' parameters
where
Note: Make sure that the options and parameters that are used in the
second and third lines are identical.
Example:
/* */ parse arg parameters 'd:\sas\sas.exe -config config.sas' parameters
If the user supplies the name of an OS/2 command file, the file must be a REXX file that follows the guidelines described for the -FILE option.
Note: This option can be used only with the NetBIOS and SPX access
methods.
If you start a spawner with the -INHERITANCE option, you then define the port that the spawner is listening on to the firewall and map it to the server machine's port. This will enable any number of SAS/CONNECT clients to connect through this single port and SIGNON to a remote host on the inside of the firewall. Each client just opens a unique socket on the defined port. This eliminates the need to define an individual port for each client that may need to come in through the firewall. In this configuration you set your REMOTE= value to a two-level name where the first level is the name of the host running the firewall and the second level is the well-known service name of the port that you have enabled for connections.
Use the following syntax to install the spawner from the SAS root directory :
connect\sasexe\spawner -install -comamid access-method
For example:
C:\SAS> CONNECT\SASEXE\SPAWNER -I -C TCP
Note: The -INSTALL option is valid for Windows NT only.
Set this option at the remote host and, optionally, at the local host to specify one or more encryption algorithms to use in a SAS/CONNECT session. However, the local host and the remote host must share an encryption algorithm in common. If you specify the option in the remote host session only, the local host attempts to select an algorithm that was specified at the remote host. If you also set the option at the local host and specify an algorithm that is not specified at the remote host, the local host's attempt to connect to that remote host fails when the local host assigns a library.
Valid values for this option are
RC2 | |
RC4 | |
DES | |
TripleDES | |
SAS Proprietary. |
See the SAS/CONNECT User's Guide or the SAS/SHARE User's Guide for more information about the -NETENCRALG option.
If the spawner is not installed as a service, use the -PATH option to point to the SECUREWIN\SASEXE subdirectory.
The default for this option is that encryption is used if the -NETENCRALG option is set and if both the local host and the remote host are capable of encryption. If encryption algorithms were specified but either the local host or the remote host is incapable of encryption, then encryption will not be performed.
Encryption may not be supported at the local host or at the remote host for the following reasons:
See the SAS/CONNECT User's Guide or the SAS/SHARE User's Guide for more information about the -NETENCRYPT option.
Valid values for this option are
128 | specifies 1024-bit RSA and 128-bit RC2 and RC4 key algorithms. |
40 | specifies 512-bit RSA and 40-bit RC2 and RC4 key algorithms. |
0 | no value is set. This is the default. |
If you require extra security, then set the -NETENCRKEY option to 128. If you prefer to save CPU, then set the -NETENCRKEY option to 40.
By default, if you try to connect a host that is capable of only a 40-bit key length with a host that is capable of both a 40-bit and a 128-bit key length, then the connection is made using the lesser key length. If both hosts are capable of 128-bit key lengths, then a 128-bit key length is used.
See the SAS/CONNECT User's Guide or the SAS/SHARE User's Guide for more information about the -NETENCRKEY option.
This option may be set at either the local host or the remote host. The default is -NETMAC.
See the SAS/CONNECT User's Guide or the SAS/SHARE User's Guide for more information about the -NETMAC option.
At the remote host, start the spawner:
spawner -NETNAME rmthost
Note: These commands are issued in the local host session.
Note: This option applies only to the NetBIOS and SPX access
methods.
-NOSCRIPT specifies that SAS.EXE be executed from the directory from which the spawner is invoked unless the -FILE option has been used to specify an alternative location. In the local SAS session, use the SIGNON NOSCRIPT option in order to undefine the RLINK fileref option.
Note: This option
applies only to the TCP/IP access method.
tells the spawner program whether or not to use the native Windows NT security subsystem. If the spawner is installed as a service, the -SECURITY option is set by default. When the -SECURITY option is specified, the local host must supply both a valid Windows NT username and a password to connect to the spawner program.
To run the spawner in a secured mode, Windows NT requires that the user invoking the spawner must have administrator privileges. All users connecting to the spawner must have the following rights:
If you are using the SPX access method, which is supported in Version 6 only, set the SASSECUR option. If you are using the TCP/IP access method, set the TCPSEC option. See the applicable platform and access method chapter for information about these options. If you are using the NetBIOS access method, which is supported in Version 6 and later releases, set security by means of the USER= and PASSWORD= options in the appropriate statements or use the SASUSER and SASPASS variables. For the NetBIOS and SPX access methods, the spawner program checks the userid and the password that are assigned to the variables SASUSER and SASPASS, respectively. For more information, see Setting Security for SAS/CONNECT and SAS/SHARE.
Note: This option applies to the TCP/IP
access method only.
Examples of Starting and Connecting to the PC Spawner |
A typical example of how to invoke the PC spawner program follows:
C:\SAS> connect\sasexe\spawner -comamid tcp -comamid netbios -netname sasrem -nocleartext
Note: When typing this command, do not use the New Line key to break the line.
Instead, allow the command to wrap automatically to the subsequent line.
In this example, two -COMAMID options are used to allow both the TCP/IP and the NetBIOS access methods to connect to the spawner program. When the NETBIOS access method is used, the -NETNAME SASREM should also be specified as the value of the REMOTE= option in the local SAS session. The -NOCLEARTEXT option specifies that the spawner will accept connections only from local hosts that support username and password encryption.
From a local host, the following statements make a connection to the spawner program with the NetBIOS access method. It uses the -NETNAME SASREM:
options comamid=netbios; signon sasrem;
From a local host, the following statements make a connection to the spawner program that runs on the node REMNODE and uses the TCP/IP access method and the TCPWIN.SCR sample script file:
options comamid=tcp; filename rlink '!sasroot\connect\saslink\tcpwin.scr'; signon remnode;
In order to sign on to a spawner program running on a nonstandard TELNET port (a port other than port 23), you need to create a macro variable that references the port number. For example, if the spawner is listening on port number 5000 and running on the remote machine HOST.CORP.COM, submit the following statements from the local host to sign on and make the connection to the PC spawner program:
%LET MYNODE=host.corp.com 5000; OPTIONS REMOTE=MYNODE; SIGNON;
Ending the PC Spawner Program |
To end the spawner program, type CTRL-C or double-click on the top left corner of the Windows or the OS/2 window that is running the program.
Chapter Contents |
Previous |
Next |
Top of Page |
Copyright 1999 by SAS Institute Inc., Cary, NC, USA. All rights reserved.