Previous Topic: Secondary Resource ChecksNext Topic: Securing PERFORM Commands


Examples: securing CEMT secondary resources

Using the following commands, the user only has permission to execute CEMT INQUIRE TRAN(CS*) commands.

TSS ADDTO(deptacid) SPI(TRANSACT)
TSS ADDTO(deptacid) OTRAN(CS)
TSS PERMIT(acidname) SPI(TRANSACT)
                     ACCESS(INQUIRE)
TSS PERMIT(acidname) OTRAN(CS)
                     ACCESS(INQUIRE)

Note: The OTRAN permission in the above example does not allow the ACID to use the transactions.

Although authorization to SPI resources can be specified for up to 44 characters, ownership of the resource is limited to eight characters.