Previous Topic: Securing z/OS Console TerminalsNext Topic: Using OPTIME Security


Terminal Locking Security

CA Top Secret provides TSS commands and a control option that allows the security administrator and individual users to control when inactive or unattended terminals are locked. The standard locktime procedure is:

Use these methods to control terminal lock time:

LOCKTIME processing occurs only on the CICS region where the user is physically signed on. For example, in an MRO environment, AOR processing is not affected. Terminals and ACIDs can be exempted from LOCKTIME processing by placing them in the LOCKTIME Bypass List.