This screen changes OS/390 and VSE rule entries in a rule set that already exists. It contains only summary information of the various rule entries. Enter an S (for SELECT) to see all of the details on the rule set.
M9PA‑2324 Change MVS/VSE Access Rule Entry List (2.3.2.4) CA ACF2 for VM COMMAND ===> ____________________________________________________________ TIME 17:12 Rulekey : ________ Entry 1 of 3 This ruleset has expanded VM‑format rules not shown here. Press PF6 to view. ‑‑‑‑‑‑‑‑‑‑‑‑‑FILE NAME‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑ ‑‑‑‑‑‑‑‑‑‑UID‑‑‑‑‑‑‑‑‑‑‑ A___ ...+...1...+...2...+...3...+...4.... . ...+....1...+....2..... WREA 001 V0191.PROFILE.EXEC SHSADTLCAMS____________ A A 002 SYS1.LINKLIB ‑______________________ AA 003 USERTEST.CREDIT.DATA SHSADTLC‑______________ AAAL PF1=Help 2=Print 3=Quit 4=Return 5=Execute 6=MVS<‑>VM PF7=Backward 8=Forward 9=Director 10=Previous 11=Next 12=Retrieve
Indicates the prefix area for this screen. The prefix area is where you select rules or enter information.
Specifies the key value of the rule set. The rulekey you specify can be up to eight characters long. You cannot mask this field.
This screen displays the data set and UID information for this rule set as it currently exists. The information displayed under DATASET NAME displays the name of the data set. The UID displays the users the rule has been written for. You can use the following commands in the prefix area to manipulate displayed rule entries:
Inserts the moved rule entry after this line (same as F )
Inserts the moved rule entry before this line (same as P )
Deletes the rule entry on this line.
Inserts the moved rule entry following this line (same as A )
Inserts a rule entry following this line.
Moves this rule entry.
Inserts the moved rule entry before to this line (same as B )
Selects this rule entry. The rule is checked to see if it is formatted like a VM rule or an OS/390 rule; then the appropriate screen is displayed with additional information.
Observe the four characters at the end of the following line:
___ ....+....1....+....2....+....3....+...4 .....+....1....+....2.WREA
These four characters stand for the type of access to be granted, respectively W=Write, R=Read, E=Execute, and A=Allocate. Enter the access privilege to be granted (A=Allow, L=Log, P=Prevent) under the appropriate access type. Here is an example of how you might define access privileges.
___ ....+....1....+....2....+....3....+...4 ....+....1....+....2.WREA 001 V0191.VOLUME SHSADTLC‑ AL
All users with a UID beginning SHSADTLC have READ access to V0191.VOLUME. All executes on this volume are logged. No access permission has been granted for WRITE. Because CA ACF2 for VM logonid provides protection by default, no permission implies PREVENT.
|
Copyright © 2009 CA Technologies.
All rights reserved.
|
|