Connecting or permitting site-defined user names authorizes them to the groups or profiles that either you or DEFSAF defined. Execute the REXX DEFSAF utility to define the resource names and groups. Execute DEFSAF again to add user names to those groups.
Use CA Top Secret to create access permissions. You can perform these steps in any order.
Note: The DEFSAF commands provided in the following steps default the BATCH option to YES. The YES value generates member PERTSS in opqhlq.OPSx.DEFSAF. Send this member to your security administrator to run the CA Top Secret commands in the member from an authorized user ID. If you specify BATCH(N) on DEFSAF, the commands are issued directly. In this mode, the running user ID requires the CA Top Secret authorities to execute successfully.
Follow these steps:
ISPF EDIT on member DEFSAF in opshlq.CCLXEXEC !OI ALL ACT(PERMIT) SAFRO(OPSUSER)
or
!OX 'opshql.REXX(DEFSAF)' ALL ACT(PERMIT) SAFRO(OPSUSER)
ISPF EDIT on member DEFSAF in opshlq.CCLXEXEC !OI OPSAOF ACT(PERMIT) SAFRW(OPSOPER)
or
!OX 'opshlq.CCLXEXEC(DEFSAF)' OPSAOF ACT(PERMIT) SAFRW(OPSOPER)
ISPF EDIT on member DEFSAF in opshlq.CCLXEXEC !OI OPSSQL ACT(PERMIT) SAFRO(OPSSQL1)
or
!OX ‘opshlq.CCLXEXEC(DEFSAF)’ OPSSQL ACT(PERMIT) SAFRO(OPSSQL1)
Note: The BATCH(Y) option generates the member in opqhlq.OPSx.DEFSAF named PERTSS. Send this member to your security administrator to run the CA Top Secret commands in the member from an authorized user ID. If the user ID where you run the DEFSAF command has sufficient authority, specify BATCH(N) and then issue the commands directly from DEFSAF.
ISPF EDIT on member DEFSAF in opshlq.CCLXEXEC
!OI OPSSQL ACT(PERMIT) SAFRW(OPSSQL1) GROUPS(Y)
or
!OX ‘opshlq.CCLXEXEC(DEFSAF)’ OPSSQL ACT(PERMIT) SAFRW(OPSSQL1) GROUPS(Y)
TSO OX 'opshlq.CCLXEXEC(DEFSAF)' OPSSQL ACT(PERMIT) SAFRO(OPSSQL1) GROUPS(N)
ISPF EDIT on member DEFSAF in opshlq.CCLXEXEC !OI OPSSQL ACT(PERMIT) SAFRO(OPSSQL1) GROUPS(N)
or
!OX ‘opshlq.CCLXEXEC(DEFSAF)’ OPSSQL ACT(PERMIT) SAFRO(OPSSQL1) GROUPS(N)
TSS PERMIT(OPSSQL1) FAC(OP$MVS.SQL.) ACCESS(READ)
You have created your access permissions with CA Top Secret.
| Copyright © 2012 CA. All rights reserved. | Tell Technical Publications how we can improve this information |