The attributes that you can apply to a single ACID are:
Allows the ability to change control options.
Allows reading and writing of installation data.
New data sets are unsecured in a non-Alwayscall environment.
Allows access or use of any data set.
Allows access or use of any volume.
Allows use of any command, program, or transaction.
Allows use of any terminal, program, CICS, IMS, CA IDMS, or user resource.
Allows the jobs to be submitted with any ACID.
Any resource access that is allowed as a result of one of the NOxxxCHK Bypass attributes is logged as a bypass event. TSSUTIL and TSSTRACK show these events as OK+B.
Examples: resource access
This example allows use of any data set at the designated access level:
DSNAME(******) ACCESS(nnnnn)
This example allows use of any data set on VOLUME(x) in any manner:
VOLUME(x) ACCESS(ALL)
The following list details permissions:
Indicates that all data set restrictions are bypassed. The permitted volume access level controls the minimum and maximum access levels.
Specifies to pass control to the installation exit (TSSINSTX) for all accesses to the resource granted by this permission. This option is valid for data sets and volumes.
|
Copyright © 2010 CA Technologies.
All rights reserved.
|
|