Previous Topic: Customize Security When Security System Is CA Top SecretNext Topic: Customize Security When Security System Is CA TPX Security


Customize Security When Security System Is CA ACF2

To customize your system when your Security System is CA ACF2

  1. Specify CA ACF2 in the Security System field of the System Options Table (SMRT).
  2. Put the application in an APF-authorized library, as described in the Installation Guide.
  3. If you are running the product as a Multiple User Single Address Space System (MUSASS), you must:
  4. If you are not running the product as a MUSASS, you must specify Y in the Bypass MUSASS Processing field of the SMRT.
  5. If the CA ACF2 CVT is pointed to by the CVTUSER field, specify CVTUSER in the CVT Location field of the SMRT.
  6. If the CA ACF2 CVT is offset into the ACTUSER area, specify OFFSET in the CVT Location field of the SMRT. You must also specify the offset in the CVT Offset field of the SMRT.
  7. If you are using an attribute byte for the product, examine the CA ACF2 Logon ID record (LIDREC) and determine the location of the attribute byte.

    Specify the location of the byte in the Auth Offset field of the SMRT.

  8. Examine the byte for the location of the CA TPX bit.

    Specify the location of the bit in the Auth Mask field of the SMRT.

Notes for CA ACF2 Users:

You can use the Security Action/Message Table (SAMT) to customize the response of the product to messages produced by CA ACF2. For information on using this table, see the Administration Guide.