Previous Topic: CAVAPPL Resource Class—Secure CAVAPPL for CAVMANNext Topic: CIMS Resource Class—Secure IMS Commands


CBIND Resource Class—Secure CBIND for z/OS Objects

Valid on z/OS.

Use CBIND to secure CBIND for z/OS objects.

When used with TSS ADDTO/REMOVE, this resource class has the following format:

TSS ADDTO(acid) CBIND(OBJECT1)
Prefix length

One to eight characters

Capacity of list

One to five prefixes per TSS command.

When used with TSS PERMIT/REVOKE, this resource class has the following format:

TSS PERMIT(acid) CBIND(OBJECT1.XXXXXXXX)
Prefix length

One to sixteen characters

Capacity of list

One to five prefixes per TSS command.

CBIND is used with:

The administrator can use any of the following methods to control access to CBIND resources: Expiration, Facility, Program Pathing, Time/Day, Actions.

Examples: CBIND resource class

This example protects the resource with CA Top Secret by assigning ownership to the Corporate Department(owning acid):

TSS ADDTO(CORPORAT) CBIND(OBJECT1)

The administration may now PERMIT access to users or profiles that require access.

This example removes ownership:

TSS REMOVE(CORPORAT) CBIND(OBJECT1)

This example permits users in the Technical Services Department to access OBJECT1.XXXXXXXX on Fridays only:

TSS PERMIT(acid) CBIND(OBJECT1.XXXXXXXX)
                 DAYS(FRIDAY)

This example permits users in the Technical Services Department to access OBJECT1.XXXXXXXX

TSS PERMIT(acid) CBIND(OBJECT1.XXXXXXXX)

This example revokes access :

TSS REVOKE(TECHPROF) CBIND(OBJECT1.XXXXXXXX)