If you look at the contents of the configuration files on the server, you’ll see that they contain the network userID of whoever modified the file. When you go in through the GUI, you don’t specify which user you are; but your Network login is used to identify who is touching the file.
When we telnet (or press the command prompt button), we have to login as ourselves, but then ‘su – hci’ once we are in. I think if you want to get real sophisticated with user security, you need to look at the Advanced Security option.
Jim Cobane
PHNS, Inc.