The TCF comes with interface routines to the ACF2, RACF and Top Secret security systems. If you use one of these, you can invoke the appropriate interface by coding the SECURITY parameter on the SET statement. TCF calls the security system you specified on the SET statement before obtaining the catalog information for the current data set. If you do not have read authority for the data set, message DCA0040 is issued and the data set bypassed.
Important Note for ACF2 Users: TCF's ACF2 interface dynamically attempts to obtain access to ACF2's CVT. If this cannot be accomplished, message DCA0071 is issued indicating the CVT could not be dynamically obtained. When this error occurs, you must link edit the ACF2 CVT with the TCF ACF2 security interface module (GDAXP014) in order for TCF to gain access to ACF2's user call interface. Without this special link edit, TCF issues message DCA0070 and TCF's security checking is deactivated for the duration of the job. Below is some sample JCL to perform this special link edit:
//LKED EXEC PGM=HEWL,PARM=(LIST,MAP),REGION=320K //SYSPRINT DD SYSOUT=A //SYSUT1 DD UNIT=SYSDA,SPACE=(1024,(50,20)) //SYSLIB DD DISP=SHR,DSN=TCF.Rnn.LOADLIB //ACF2 DD DISP=SHR,DSN=ACF2.LOADLIB //SYSLMOD DD DISP=SHR,DSN=DCA.Rnn.LOADLIB //SYSLIN DD * SETCODE AC(0) INCLUDE ACF2($ACFGCVT) INCLUDE SYSLIB (GDAXP014) ENTRY GDAXP014 NAME GDAXP014
Note: The JCL above shows the module name for the ACF2 CVT as $ACFGCVT. Your release of ACF2 can use ACF$GCVT instead. Attempt the link edit with the JCL shown. If you get an unresolved reference for $ACFGCVT, resubmit the job with the alternate module name.
| Copyright © 2012 CA. All rights reserved. |
|