This example shows how to use CA Top Secret commands to configure the started task user permissions.
For detailed information about using these commands, see the CA Top Secret documentation.
Follow these steps:
Note: The first step applies only if the resource is not owned.
TSS ADDTO(ACID) IBMFAC(IXCARM)
TSS PERMIT(stc-acid) IBMFAC(IXCARM.) ACCESS(READ,UPDATE)
The started task can use ARM.
|
Copyright © 2015 CA Technologies.
All rights reserved.
|
|