Previous Topic: Access CA SOLVE:FTS

Next Topic: Lists


Authorized Users

The access that a user has to functions depends on the privileges allocated in the definition of their user ID.

Note: For more information about user ID definition requirements, see the Installation Guide.

The functions fall into the following categories:

Note: Within all categories, the requests or definitions that a user can reference are restricted to those with names that are valid for the user's private or system access and the associated access masks.

Private and System Requests

The concept of private and system requests let users carry out their own data set transmission requirements without being able to interfere with the transmission activities associated with the installation's production operations.

In general, individual users who need the data set transmission for private purposes are assigned privileges that enable them to define transmission requests for the movement of their own data sets, to request them, and to monitor the progress of those requests. They are not able to define or examine system definitions or request their execution.

Operational staff responsible for monitoring CA SOLVE:FTS activity are typically allowed control over the requesting of system definitions, and control over their progress and the overall CA SOLVE:FTS environment These personnel may not necessarily be able to act as private users themselves and probably are not allowed access to system definitions.

Access Masks

An access mask is a 1- to 12-character string with which the name of a selected definition is compared. Access to the definition is granted only if the characters in the mask match the characters in the definition name.

Each user can be assigned two such access masks; one that controls their access to private definitions (if authorized) and one that controls their access to system definitions (if authorized).

Note: Masks are specified in the user ID definition.

Note: For more information about the implications of private and system users, and masks, see the Administration Guide.