Connecting or permitting site-defined user names authorizes them to the groups or profiles that either you or DEFSAF defined. Execute the REXX DEFSAF utility to define the resource names and groups. Execute DEFSAF again to add user names to those groups.
Use IBM RACF to create access permissions. You can perform these steps in any order.
Follow these steps:
ISPF EDIT on member DEFSAF in opshlq.CCLXEXEC !OI ALL ACT(PERMIT) SAFRO(OPSUSER)
or
!OX ‘opshlq.CCLXEXEC(DEFSAF)’ ALL ACT(PERMIT) SAFRO(OPSUSER)
ISPF EDIT on member DEFSAF in opshlq.CCLXEXEC !OI OPSAOF ACT(PERMIT) SAFRW(OPSOPER)
or
!OX ‘opshlq.CCLXEXEC(DEFSAF)' OPSAOF ACT(PERMIT) SAFRW(OPSOPER)
ISPF EDIT on member DEFSAF in opshlq.CCLXEXEC !OI OPSSQL ACT(PERMIT) SAFRO(OPSSQL1)
or
!OX ‘opshlq.CCLXEXEC(DEFSAF)’ OPSSQL ACT(PERMIT) SAFRO(OPSSQL1)
Note: The BATCH(Y) option generates the member in opqhlq.OPSx.DEFSAF named PERRACF. Send this member to your security administrator to run the RACF commands in the member from an authorized user ID. If the user ID where you run the DEFSAF command has sufficient authority, specify BATCH(N) and then issue the commands directly from DEFSAF.
ISPF EDIT on member DEFSAF in opshlq.CCLXEXEC !OI OPSSQL ACT(PERMIT) SAFRW(OPSSQL1) GROUPS(Y)
or
!OX ‘opshlq.CCLXEXEC(DEFSAF)’ OPSSQL ACT(PERMIT) SAFRW(OPSSQL1) GROUPS(Y)
TSO OX 'opshlq.CCLXEXEC(DEFSAF)' OPSSQL ACT(PERMIT) SAFRO(OPSSQL1) GROUPS(N) ISPF EDIT on member DEFSAF in opshlq.CCLXEXEC !OI OPSSQL ACT(PERMIT) SAFRO(OPSSQL1) GROUPS(N)
or
!OX ‘opshlq.CCLXEXEC(DEFSAF)’ OPSSQL ACT(PERMIT) SAFRO(OPSSQL1) GROUPS(N)
PERMIT OP$MVS.SQL.* CLASS(FACILITY) ID(OPSSQL1) ACCESS(READ)
You have created your access permissions with IBM RACF.
| Copyright © 2012 CA. All rights reserved. | Tell Technical Publications how we can improve this information |