Previous Topic: Securing CEMT CommandsNext Topic: Examples: securing CEMT secondary resources


Secondary Resource Checks

The following table indicates that certain CEMT keywords require secondary resource checks. When secondary checks are used:

Like CEMT INQUIRE, the CEMT SET action is also used to provide a display of affected resources (after the SET operands are implemented). For this reason, individual resources described in the table, CEMT Secondary Resource Checks, will often need both INQUIRE and SET access to invoke alteration through CEMT. You should also note that:

The following table shows the relationship between a CEMT keywrod and a secondary resource type:

CEMT Keyword

Secondary Resource Type

DB2ENTRY*

DB2ENTRY

DB2TRAN*

DB2TRAN

DSNAME

DATASET

FILE

FCT

JOURNAL

JCT

PROGRAM

PPT

QUEUE

DCT

TRANSACTIONS

OTRAN or LCF

VOLUMES

VOLUMES

Note: * CTS 1.2 and above only

Notes