The TSSSIM utility provides the ability to test permissions stored in the Security File without affecting the “real” production environment. Testing consists of invoking a simulated resource command for a specific resource. TSSSIM will report whether the currently active simulated ACID has access to that resource under the specified conditions. These conditions can include SVC‑in‑control, access level, privileged program and facility restrictions.
TSSSIM can also be used as a diagnostic tool in order to debug the Security File. For example, if a user has several Profiles attached to his ACID, it might be difficult to pinpoint the source of an access authorization or denial. By interpreting trace information generated by the security algorithm, TSSSIM can isolate the exact permission or ownership as well as the record (user, profile, ALL) in which the permission is contained.
TSSSIM can be executed under TSO, BATCH and Advantage™ CA Roscoe®. You should note, however, that when access to DB2 resources is tested, TSSSIM does not perform hierarchical checking. Access information extracted from TSSSIM is based on explicit PERMITs and ADDs for each resource. Implied or associated access to another, related resource, although valid in a PERMIT, is not taken into consideration by TSSSIM.
For more information about using the TSSSIM utility, see your CA Top Secret Troubleshooting Guide.
|
Copyright © 2011 CA Technologies.
All rights reserved.
|
|