Previous Topic: Examples: securing EXEC CICS INQUIRE and SET commandsNext Topic: Secure CICS SPOOLOPEN Commands


Examples: securing EXEC CICS ENABLE, DISABLE, EXTRACT, COLLECT STA EXEC CICS ENABLE

In In this example, the user only has permission to execute the EXEC CICS ENABLE commands:

TSS ADDTO(deptacid) SPI(EXITPROG)
TSS PERMIT(acidname) SPI(EXITPROG)
                     ACCESS(SET)

In In this example, the user only has permission to execute the EXEC CICS DISABLE commands:

TSS ADDTO(deptacid) SPI(EXITPROG)
TSS PERMIT(acidname) SPI(EXITPROG)
                     ACCESS(SET)

In In this example, the user only has permission to execute the EXEC CICS EXTRACT commands:

TSS ADDTO(deptacid) SPI(EXITPROG)
TSS PERMIT(acidname) SPI(EXITPROG)
                     ACCESS(INQUIRE)

In In this example, the user only has permission to execute the EXEC CICS COLLECT STATISTICS commands:

TSS ADDTO(deptacid) SPI(EXITPROG)
TSS PERMIT(acidname) SPI(EXITPROG)
                     ACCESS(COLLECT)