Valid on z/OS, z/VSE, and z/VM.
Use the NOSUBCHK keyword to allow an ACID to bypass alternate ACID usage as well as all job submission security checking. Associated ACIDs may submit all jobs regardless of the (derived) ACID on the job card being submitted. Auditing will occur.
NOSUBCHK grants the ACID authorization to submit any batch job on behalf of another ACID without requiring a password. This includes the MSCA, emergency ACIDs, and system critical ACIDs. This attribute should be given out on a limited basis. If a schedular does its own cross submit authorization checking during the batch submit, it is safe to give the NOSUBCHK attribute to the schedular started task ACID. Otherwise, there is no way to audit the schedular's ACID.
This keyword has the following format:
TSS ADDTO(acid) NOSUBCHK
Note: For z/OS, the USER= keyword must still be inserted onto the job card prior to z/OS submission.
This keyword is used with:
This example allows a Production Controller to submit a job on behalf of any accessor:
TSS ADDTO(PRDCTL1) NOSUBCHK
This example removes the NOSUBCHK attribute:
TSS REMOVE(PRDCTL1) NOSUBCHK
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|