Utilities in JRButils for Micro Focus v28

A to F


Accexp is intended for use in a login script where it displays a warning if the user’s account is about to expire. It may also be used to check the account status of a na med user. The number of days before expiration at which warnings begin is adjustable and defaults to seven. Both text mode and GUI versions are available.


Associates objects with ZEN applications. It can do the following:

  • Associate users, group objects, all members of a group, and container objects with an application.
  • Associate work station objects, workstation group objects and all members of a workstation group with an application.
  • Use the default association flags of the application object.
  • Use user-supplied association flags.
  • Supports chained applications.


Disassociates objects from ZEN applications. It can do the following:

  • Removes associations between objects and ZEN application objects.
  • Remove associations for users, group objects, all members of a group, and container objects.
  • Remove associations for work station objects, workstation group objects and all members of a workstation group.
  • Supports chained applications.


Lists the objects associated with ZEN applications. It can do the following:

  • List the associated objects for one or more applications, and the association flags.
  • Allows logical operators to be used so that you can list the associated objects common to two or more application objects, or those associated with any of the application objects.
  • Allows sorting of the associated objects.
  • May expand associated groups or containers, listing all members of the group, or all users in the container, to produce a complete list of associated users, whether associated directly, or via a group or container object.
  • Can produce comma delimited output with fields optionally enclosed in quotes.
  • Can list the associations as appadd or appdel commands.


Checkval is intended for use in a script or batch file to determine whether an attribute of an object has a given value e.g. that the OU (department) attribute contains “Marketing”. An error level is set indicating the result. Checkval may be used for any attribute holding a string value, and for attributes holding objects as values.


Chkhome allows you to check that “Home Directory” attributes are set correctly and to display the paths contained therein. Specifically chkhome can:

  • Display home directories for one or more users. When obtaining the home directory path from the “Home Directory” attribute, the name space in which the path is stored is also displayed.
  • Check for each user that the directory stored in the “Home Directory” attribute actually exists, and if it does not, chkhome will search other volumes on the server for a matching directory.
  • For a single directory, or for all subdirectories of a directory, check if there is a user in eDirectory corresponding to the lowest level directory name i.e. for vol1:users\karen, chkhome will search eDirectory for user Karen.
  • For each directory, check that the corresponding user’s “Home Directory” attribute contains that directory e.g. for vol1:users\karen chkhome checks that Karen’s “Home Directory” contains vol1:users\karen.
  • Can display each user’s default server and check that it is on the same server as the home directory.
  • Can check the “Home Directory” attribute for lowercase characters in the path. Some earlier Novell tools allowed a path in the DOS name space to be stored in lowercase, but the file system itself require DOS paths in uppercase.
  • Can check that the name space field is set correctly in the “Home Directory” attribute.
  • Can check that the lowest level of the path from the “Home Directory” attribute matches the user name.
  • Can check that each user has the required rights (e.g. RWCEMF) to their home directory.
  • Can display up to nine different fields relating to the home directory path including the owner and rights. The output may be in columnar or delimited format.
  • Can limit the output to those users with a particular character sequence in the combined volume and path e.g. VOL3.


Checks all files in a directory structure and lists those with non-standard characters in the name. By default non standard characters are anything other than 0-9, a-z, space, ‘.’, ‘~’, ‘-’ and ‘_’. Alternative sets of allowable and non-standard characters may be specified. Features include:

  • Files may be renamed by removing the non standard characters.
  • Files may be renamed by replacement of the non standard characters with a nominated character.  
  • Leading spaces in file names may also be identified, removed or replaced.
  • Can also be used on Windows drives.
  • Can process a directory structure to a nominated depth.


Copies objects in eDirectory. Its features include:

  • New objects may have the same name in a different context, or a different name in the same context as the object being copied, or a different name in any other context.
  • Can copy many classes of object, and copies all attributes making changes where necessary. For example any reference to the source object in attribute values (e.g. for ACLs) are changed to the new object’s name.
  • If a user being copied has a corresponding GroupWise user under 2012 and earlier, the new user will be added into GroupWise.
  • Has various options to control what is copied e.g. it is possible not to add new users into GroupWise or to suppress copying of auxiliary classes belonged to.


Creatobj allows creation of eDirectory objects of almost any class. It is intended primarily for creating users in batch mode. See also jrbimprt. Creatobj can do the following:

  • Set a password.
  • Can set almost any attribute for any class of object. Attributes and values can be given on the command line in the form attr=value.
  • Create a login script.
  • Create a home directory and grant rights to it.
  • Store the home directory path in the “Home Directory” attribute.
  • Enable password expiration and either expire the password or set it to expire in n days time.
  • Can copy attributes from a template when creating users.
  • Can specify a time delay to occur between creating a user and attempting to create the home directory and grant rights to it. This gets around an eDirectory programming problem where a user creation request is directed to one server, the home directory is created on a second but the new user has not yet been replicated to that second server. An eDirectory request to create an object can be directed to a particular server and creatobj will attempt to do this.
  • Can initiate a synchronization of the replica immediately after creation of the new object.
  • Has a debug option for replication issues, where it reports on which server an object is created, and the server to which subsequent requests are sent.
  • Can add new users into GroupWise 2012 and earlier from a template.
  • Can add new users into GroupWise 2014 onwards from a template when the jrbsGroupWise auxiliary class has been added to the schema via new program gwxschema.
  • Sets the uniqueID attribute equal to the user name. This attribute is required for some products such as iPrint.


This program decompresses compressed files by repeatedly reading them until they remain uncompressed on the volume. It can also list all compressed files in a directory structure or entire volume.


Deladdr can be used to overcome a problem caused by a bug in eDirectory where a user’s network address is sometimes not removed at logout. When a user logs in, the network address of the workstation is added to the user’s “Network Address” attribute. The number of addresses in this attribute is used at login to determine the number of concurrent connections and whether the user has reached their limit. When addresses are not removed, a user may be informed that they have reached their connection limit when in fact they have not. Deladdr can be used to remove addresses where there is no corresponding connection. Because the addresses cannot be linked back to the server to which the user connected, deladdr requires a list of servers to be searched for connections with matching addresses to ensure addresses are not deleted for users currently logged in.


Deletes a selected attribute from one or more eDirectory objects. Delattr refuses to delete some attributes where their removal might cause problems. These exclusions include ACLs, “Security Equals”, and partition related attributes. This does not mean that it is safe to use delattr to delete all attributes which are not excluded. Many attributes are not set in isolation e.g. removing a user from a group requires modification of two user and two group attributes, and anyone using delattr needs to be aware of such relationships. Use delattr cautiously, and entirely at your own risk. Delattr supports the deletion of optional attributes associated with auxiliary classes.


Delobj can delete almost any class of object from eDirectory. For safety, you may not use wildcards when deleting objects. Nor will delobj delete groups with members. Features include:

  • When deleting users, delobj will delete the user’s home directory if it is stored in the “Home Directory” attribute, or if a path is specified on the command line.
  • Can remove associated users and external entities from GroupWise 2012 and earlier.
  • Can remove associated groups and users from GroupWise 2014 onwards.
  • Supports the jrbsGroupWise auxiliary class which allows delobj to detect that an eDirectory user has an associated user in GroupWise 2014 onwards, and to delete the GroupWise user when /w is used.
  • Multiple objects may be deleted using an input file.


Disable disables logins on NetWare servers. Use JRButils’ enable program to subsequently re-enable logins. This program is not supported on OES Linux.


Downsrvr may be used by a console operator or supervisor equivalent user to down a NetWare server. By default it will ask for confirmation before downing the server, but you may suppress this. This program is not supported on OES Linux.


Dquota is intended for use in a login script to display the user’s quota, space used and space available. It can display both volume based and directory based quotas. The format of the output is extremely flexible, and it is possible to supply a text file with substitution parameters for the quota, space used or space available. It may also be used to display values for any subdirectory of each user’s home directory. Warnings may be given if the user’s free space falls below a certain threshold. The 64 bit quota APIs introduced in OES 2015 are fully supported.


This program enables logins on NetWare servers. Use JRButils’ disable program to disable logins. This program is not supported on OES Linux.


Checks all files in a directory structure and reports the number and size by extension. It can also report the number and size older than a given date. The results may be reported in columns or comma delimited for import to a spreadsheet. Extcheck supports both Micro Focus and Windows drives, and can process multiple directories via an input file.


Findref locates all references to a particular object in an eDirectory tree, and can optionally delete those references, or replace the object name with that of another object. The ability to replace all references may be useful for example, when replacing a volume and it is known that the volume object will be deleted and recreated. When a volume object is deleted, all attribute values containing that object name are deleted. This includes “Home Directory” attributes for users, and “Path” attributes for directory maps. Findref could be used to replace the volume object in those attributes with the name of a placeholder object, and when the new volume and its corresponding volume object have been created, replace the placeholder with the new volume object.

For another example of using findref, read Leonard Holling’s Cool Solutions article on “Removing Unwanted and Unknown ACLs”.


Displays the rights of selected objects to files and directories. These are the actual rights, not just the trustee assignments. The rights may be received via a trustee assignment to the target file or directory, via a trustee assignment at a higher level, they may be restricted via inheritance rights filters, they may be received through security equivalence to another object, or by the rights being granted to one of the object’s parent containers. Features of fsrights include:

  • Can display the rights of one object or multiple objects to a single target directory or file, or to multiple directories or files.
  • Can filter the results by rights e.g. show only those results where the objects have S rights, or eliminate results where the object has no rights.
  • Can show how the rights are derived by displaying inherited rights filters and relevant trustee assignments at each level from the volume root down to the selected file or directory.
  • Can show the rights in a directory tree at th startng level and thereafter only when the rights change. This is probably the most useful way to display an object’s rights to a directory structure.
  • Can process multiple target servers in a single command.
  • Can produce comma delimited output.


Fsupdate allows you to perform file maintenance operations across multiple servers. Its features include:

  • Can copy individual files, files selected via wildcards, or entire directory trees to multiple servers. Fsupdate attempts to retain all file attributes including ownership, creation and last update dates.
  • Can delete individual files, files selected via wildcards, or entire directory trees on multiple file servers.
  • Supports both Micro Focus and Windows drives.
  • Can selectively copy and delete files based on the creation date, modification date, archive date, last access date, attributes (e.g. compressed), owner, updater and archiver of the source files. When copying, the filter may be applied to the properties of target files which will be overwritten if the copy proceeeds.
  • Can selectively copy subdirectories via wildcards in the name.
  • Can show which files will be deleted for a delete operation without actually deleting the files. This option is intended for use with a selective delete and will show the value for the attribute on which the files are selected.
  • Can rename files on multiple servers. This facility may be used to move files from one directory to another providing that the source and target directories are on the same volume.
  • Can specify the attributes to set on copied files and directories.
  • Can overwrite, delete or rename files flagged read-only.
  • Can copy trustee assignments.
  • Can copy files larger than 4.3 GB.
  • Can purge files which have been deleted.
  • Can retain compression when copying files.
  • Copies sparse files correctly from NSS to NSS drives, NSS to Windows and vice versa, and Windows to Windows.
  • Has a mirroring option to remove non-matching files, directories and trustee assignments in the target directories.
  • Can use an input file containing the names of files and directories when copying, deleting or setting attributes.
  • Can skip selected files and directories when copying or deleting a directory structure.
  • Accepts multiple paths separated by semicolons. These may be destination paths when copying files, paths to be deleted, or paths for which the attributes are to be modified.
  • Can attempt to copy owners and trustees to Windows. By default, fsupdate requires that Windows SAM account names match the eDirectory common names. If they do not, and if fsupdate is running on a workstation which is a domain member, the user is logged into the domain, and the target host is in the same domain, then fsupdate will attempt to match the eDirectory CN with an Active Directory CN. If there is exactly one match which is a user or group, that object is used. Alternatively, a file of name translations may be used. It can be applied to eDirectory to AD copies, and when copying from one Windows domain to another.
  • Can attempt to transfer IRFs from an NSS volume to an NTFS drive.
  • Can copy DACL entries when the source and target paths are on Windows drives.
  • Can copy all volume quotas from one NSS volume to another, or from one Windows volume to another.
  • Can report the number of files to be copied, deleted, renamed, or have attributes modified without actually performing the requested operation.
  • Can display the elapsed time (hh:mm:ss) for the requested operation in the final totals line.