Previous Topic: Enable the Logging of SPO and Unsolicited PPO Messages

Next Topic: Define User Exits


Security

Access to a region is controlled by the User ID Access Maintenance Subsystem (/UAMS).

For more information, see the Security Guide.

Security Considerations for Existing Users

If you are using a pre-existing UAMS database, perform the following tasks to ensure that users are authorized to operate in the region:

Check Existing User Group Definitions

To ensure that the group definitions are authorized

  1. Enter /UAMS at the prompt.

    The UAMS : Primary Menu appears.

  2. Type L at the prompt and $RM in the User field.

    The group definitions are listed.

  3. Update each of the $RMADMIN, $RMBUSER, $RMMON, $RMNOPER, and $RMOPER definitions to ensure that the following fields are specified correctly:

Panel

Field

Value

3rd

Network Management field on the Access Authorities panel

Y

7th

NEWS Access field on the Network Management Details panel

Y

7th

Reset Authority field on the Network Management Details panel

N for $RMMON; Y for others

7th

NTS Access field on the Network Management Details panel

Y

7th

NCS Access field on the Network Management Details panel

Y

7th

NCPView Authority field on the Network Management Details panel

1