Valid on z/OS.
Use CBIND to secure CBIND for z/OS objects.
When used with TSS ADDTO/REMOVE, this resource class has the following format:
TSS ADDTO(acid) CBIND(OBJECT1)
One to eight characters
One to five prefixes per TSS command.
When used with TSS PERMIT/REVOKE, this resource class has the following format:
TSS PERMIT(acid) CBIND(OBJECT1.XXXXXXXX)
One to sixteen characters
One to five prefixes per TSS command.
CBIND is used with:
The administrator can use any of the following methods to control access to CBIND resources: Expiration, Facility, Program Pathing, Time/Day, Actions.
This example protects the resource with CA Top Secret by assigning ownership to the Corporate Department(owning acid):
TSS ADDTO(CORPORAT) CBIND(OBJECT1)
The administration may now PERMIT access to users or profiles that require access.
This example removes ownership:
TSS REMOVE(CORPORAT) CBIND(OBJECT1)
This example permits users in the Technical Services Department to access OBJECT1.XXXXXXXX on Fridays only:
TSS PERMIT(acid) CBIND(OBJECT1.XXXXXXXX)
DAYS(FRIDAY)
This example permits users in the Technical Services Department to access OBJECT1.XXXXXXXX
TSS PERMIT(acid) CBIND(OBJECT1.XXXXXXXX)
This example revokes access :
TSS REVOKE(TECHPROF) CBIND(OBJECT1.XXXXXXXX)
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|