This section contains the following topics:
Security administrators use CA Top Secret command functions to communicate their administrative requirements to CA Top Secret. These requirements can range from the creation of an ACID to the definition of resource ownership.
CA Top Secret command functions are independent of the system facility. The security administrator uses command functions in the same manner, regardless of whether the facility is TSO, CICS, BATCH, CA‑Roscoe®, IMS, or CA‑IDMS®.
CA Top Secret command syntax has the following format:
TSS FUNCTION(ACID|ACIDS|ALL|APPLU|AUDIT|DLF|FDT|MLSSTC|NDT|RDT|SDT)
KEYWORD(OPERAND)[/* COMMENTS */]
CA Top Secret commands always begin with TSS.
Specifies the function CA Top Secret performs. The rules for the function are:
Specifies the ACID being affected by the function.
Specifies the resource type or security attribute being processed by the function. The rules for the keywords are:
Specifies the prefix, resource name, required value, or name for a security attribute. The rules for operands are:
Enter comments at any point in a command after the first keyword.
The rules for comments are as follows:
CA Top Secret functions can be entered freeform onto the command screen of an online terminal, or into any of the CA Top Secret administration panels.
This example creates the user USER01 with all of their required properties:
TSS CREATE(USER01) TYPE(USER)
NAME('H.PARKER')
PASSWORD(1234,30,EXPIRE)
SOURCE(GRAF0076)
PROFILE(BUDGET,TAXES,CRIME)
DSNAME(SYS.01)
DEPARTMENT(DEPTB01)
TSS command functions can be entered and changed using the CA Top Secret full‑screen administration panels, if the TSO installation uses IBM's System Productivity Facility (SPF or ISPF), or if the administrator is running under CMS. These panels provide the administrator with a fill‑in‑the‑blank application for the TSS command.
To access the CA Top Secret selection panel
The system displays the CA Top Secret Selection Panel:
P000001 Security Administration Main Menu CA TOP SECRET
===>
Concerning Me... Resource Administration
1 Who am I? 21 Assign/remove resource ownership
2 Lock my terminal 22 Permit/revoke resource access
3 Unlock my terminal 23 Display resource access/ownership
24 Certificate Management processing
ACID Administration
11 Create ACID CA TOP SECRET System Administration
12 Change ACID attributes 32 Modify security tables
13 Assign administrative authority
14 Display ACID information, REFRESH ACID
15 Acid Compare/Modeling
Options for TSS Administration Session
( _ ) List after successful command
( _ ) Clear after successful command
( _ ) Display TSS command text
PF1= Help 2= Defaults 3= End 4= Return 5= 6=
PF7= Up 8= Down 9= 10= 11= 12=
When an ACID enters a CA Top Secret command function, CA Top Secret:
Command functions cause CA Top Secret to issue a variety of messages. For information, see the Messages and Codes Guide.
If a command is successful, CA Top Secret issues the message:
If a command fails CA Top Secret issues the message:
Specifies the return code. Possible values are:
Message TSS0301I is followed by a message in the TSS0200 series that explains the cause of the problem.
CA Top Secret processes only command functions (with the exceptions of HELP and WHOAMI) issued by ACIDs who have administrative authority. This administrative authority is limited to the scope of the administrator.
Generic prefixing, designated with a (G), allows the administrator to identify multiple VMUSER IDs. This is used with:
Example: generic prefixing
This example permits a System's Programmer to use the spooling command CHANGE for files belonging to any user ID prefixed with TDG:
TSS PERMIT(SYSPROG) CPCMD(CHANGE)
VMUSER(TDG(G))
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|