Valid on z/OS.
Use LDAP to secure authorization roles for LDAP administration.
When used with TSS ADDTO/REMOVE, this resource class has the following format:
TSS ADDTO(acid) LDAP(server)
2-26 characters
1-8 prefixes per TSS command
When used with TSS PERMIT or REVOKE, this resource class has the following format:
TSS PERMIT(acid) LDAP(server)
1-246 characters
1-8 prefixes per TSS command
This keyword is used with:
The administrator can use any of the following methods to control access to SERVER resources: Expiration, Facility, Program Pathing, Time/Day, and Actions.
Examples: LDAP resource class
This example protects the resource by assigning ownership to the Corporate Department. After ownership is assigned, the administrator can PERMIT access to users or profiles.
TSS ADDTO(CORPORAT) LDAP(SERVER1)
This example PERMITs a user to access the password administrative role:
TSS PERMIT(JOHN01) LDAP(GLDSEC.ADMINROLE.PASSWD) ACCESS(READ)
This example revokes access to the password administrative role:
TSS REVOKE(JOHN01) LDAP(GLDSEC.ADMINROLE.PASSWD)
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|