Valid on z/OS.
Use APPLICATION to secure IMS Application Group Names and, when securing APPC conversations (z/OS, ESA 4.2.2 and above), to identify the application name of the LU to which a conversation request is sent.
When used with TSS ADDTO/REMOVE, this resource class has the following format:
TSS ADDTO(acid) APPLICATION(oper,oper...)
One to eight characters
One to five AGNs per TSS command
When used with TSS PERMIT/REVOKE, this resource class has the following format:
TSS PERMIT(acid) APPLICATION(prefix(es))
One to eight characters
One to five prefixes per TSS command
APPLICATION is used with:
The administrator can use any of the following methods to control access to APPLICATIONs: Expiration, Facility, Time/Day, and Actions.
This example protects the IMS application 'PAYP' (production payroll), by assigning ownership to the Corporate IMS Department (CORPIMS):
TSS ADDTO(CORPIMS) APPLICATION(PAYP)
This example removed ownership:
TSS REMOVE(CORIMS) APPLICATION(PAYP)
This example permits access to the production payroll application on weekdays from 8:00 a.m. to 5:00 p.m.:
TSS PERMIT(IP3AA) APPLICATION(PAYP) DAYS(WEEKDAYS) TIMES(08,17)
This example revokes access to PAYP:
TSS REVOKE(IP3AA) APPLICATION(PAYP)
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|