Valid on z/OS, z/VSE, and z/VM.
Use the DEFACC keyword to assign the default access used on a TSS PERMIT for a resource that has been added to the RDT Record.
This keyword has the following format:
TSS ADDTO(RDT) RESCLASS(resource Type)
RESCODE(hex code)
[DEFACC(access list)]
If not specified, the default access is NONE
Note: The access level specified by DEFACC must match the applicable access levels indicated by the ACLST entries for that resource. If they do not match or, if no ACLST was specified, you will receive a TSS0282E error message.
This keyword is used with:
The predefined CA Top Secret access levels, with their associated hexadecimal values are:
|
ALL=FFFF |
AUTOLOG=4000 |
BLP=8000 |
|
BROWSE=0200 |
COLLECT=0002 |
CONTROL=0400 |
|
CREATE=1000 |
DELETE=1000 |
FEOV=0200 |
|
FETCH=8000 |
FIND=1000 |
GRPLOGON=1000 |
|
LOGON=8000 |
MREAD=4400 |
MWRITE=2400 |
|
MULTI=0400 |
NOCREATE=0100 |
NONE=0000 |
|
NONSHR=2000 |
PURGE=0100 |
READ=4000 |
|
REPL=0800 |
SCRTCH=0800 |
SHR=4000 |
|
SUROGATE=2000 |
UPDATE=8000 |
WRITE=2000 |
This example creates a user‑defined resource class. If the access level is not known to CA Top Secret, specify the hex value in the DEFACC as well as the ACLST fields:
TSS ADDTO(RDT) RESCLASS(NEWRES)
RESCODE(001)
ACLST(ALLOW=4000)
DEFACC(ALLOW=4000)
This example establishes a TSS PERMIT default access level of READ to the #PRODUCT resource:
TSS ADDTO(RDT) RESCLASS(#PRODUCT)
RESCODE(002)
DEFACC(READ)
Now, when any #PRODUCT resource is permitted to a user and the ACCESS keyword is omitted from the PERMIT, a default access level of READ is used.
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|