Previous Topic: Examples: securing CEMT secondary resourcesNext Topic: Securing EXEC CICS Commands


Securing PERFORM Commands

The PERFORM action of the CEMT command has related keywords. This section describes how CA Top Secret secures each keyword for the CEMT PERFORM action.

The following table lists the CEMT command keywords and their SPI equivalents for the CEMT PERFORM action:

Command Keyword

SPI Keyword

CLASSCACHE

SPI(CLASSCAC)

DELETESHIPPED

SPI(DELETESH)

DUMP

SPI(DUMP)

RECONNECT

SPI(RECONNEC)

RESET

SPI(RESET)

SECURITY

SPI(SECURITY)

SHUTDOWN

SPI(SHUTDOWN)

SNAP

SPI(SNAP)

STATISTICS

SPI(STATISTI)

Example: securing CEMT PERFORM commands

In In this example, the user only has permission to execute CEMT PERFORM SHUTDOWN commands:

TSS ADDTO(deptacid) SPI(SHUTDOWN)
TSS PERMIT(acidname) SPI(SHUTDOWN)
                     ACCESS(PERFORM)

Securing ADD and REMOVE Commands

In CICS 4.1, you can secure CEMT SET VOLUME( ) ADD and REMOVE commands for VOLUMEs only. The following table lists valid access levels:

Command Keyword

SPI Keyword

VOLUME

SPI(VOLUME)

Examples for securing CEMT ADD and REMOVE commands appear in the following. Using these commands the user has permission to execute CEMT ADD and REMOVE commands for VOLUMEs only.

TSS ADDTO(deptacid) SPI(VOLUME)
TSS PERMIT(deptacid) SPI(VOLUME)
                     ACCESS(SET)
TSS REMOVE(acidname) SPI(VOLUME)
TSS REVOKE(acidname) SPI(VOLUME)
                     ACCESS(SET)