Previous Topic: Command Protection Profiles

Next Topic: How Command Protection Profiles Work

List of Commands Eligible for Protection Profiles

This section contains a list of the console commands that you can protect with command protection profiles.

Some of these commands have qualifying command parameters that allow you to further refine access to that command's detailed function. You can also generate generic resource commands that include in their scope all of the subfunctions of the command. If a command that has qualifying command parameters is on this list and a qualifying parameter is not listed, all forms of the command are governed by the command protection profile unless otherwise noted. If a command with a qualifying command parameter is on this list, only that form of the command is governed by the command protection profile.

The following commands can be protected with command protection profiles:

Note: To execute the TBEMIGRT symmetric key management utility when security profiles are in effect, the user must have access to the MIGRATE command. If you have security access that allows you to issue the MIGRATE command, then you also have permission to run the TBEMIGRT utility as a batch job.

For information about using the CA Tape Encryption console commands, see the Configuration Guide.