The following table lists the commands and the authorization levels required to be able to use them:
|
Command |
Level |
Command |
Level |
Command |
Level |
|---|---|---|---|---|---|
|
ABEND |
2—Extended |
HF |
1—Normal |
R |
1—Normal |
|
AF |
1—Normal |
HS |
2—Extended |
REINIT |
2—Extended |
|
B |
1—Normal |
HX |
2—Extended |
RF |
1—Normal |
|
C |
1—Normal |
I |
1—Normal |
S |
1—Normal |
|
CF |
1—Normal |
LOGOFF |
1—Normal |
SC |
2—Extended |
|
CHKPT |
2—Extended |
LSYS |
2—Extended |
SHUTDOWN |
2—Extended |
|
D |
1—Normal |
M |
1—Normal |
SNET |
2—Extended |
|
DA |
1—Normal |
P |
1—Normal |
SS |
2—Extended |
|
DC |
2—Extended |
PC |
2—Extended |
SX |
2—Extended |
|
DF |
1—Normal |
PD |
2—Extended |
T |
1—Normal |
|
DS |
2—Extended |
PF |
1—Normal |
TF |
1—Normal |
|
DX |
2—Extended |
PFSS |
2—Extended |
TNET |
2—Extended |
|
E |
1—Normal |
PNET |
2—Extended |
TV |
2—Extended |
|
ESYS |
2—Extended |
HT |
2—Extended |
WRITELOG |
2—Extended |
|
F |
1—Normal |
ST |
2—Extended |
Z |
1—Normal |
|
Copyright © 2015 CA Technologies.
All rights reserved.
|
|