

Resources › CTSDB2 Resource Class—Secure CTS DB2ENTRY and DB2TRAN Resources
CTSDB2 Resource Class—Secure CTS DB2ENTRY and DB2TRAN Resources
Valid on z/OS.
Use CTSDB2 to secure DB2ENTRY and DB2TRAN resources in CICS Transaction Server (CTS) 1.2 and above.
When used with TSS ADDTO/REMOVE, this resource class has the following format:
TSS ADDTO(acid) CTSDB2(prefix(es))
- Prefix length
-
One to eight characters
- Capacity of list
-
One to five CICS DB2 resource prefixes per TSS command
When used with TSS PERMIT/REVOKE, this resource class has the following format:
TSS PERMIT(acid) CTSDB2(prefix(es))
ACCESS(access levels)
- Prefix length
-
One to eight characters
- Capacity of list
-
One to five prefixes per TSS command
CTSDB2 is used with:
- The commands CREATE, ADDTO, REMOVE, PERMIT, REVOKE, ADMIN, DEADMIN, WHOOWNS, and WHOHAS
- ACID types User, Profile, Department, Division, Zone, DCA, VCA, ZCA, LSCA, SCA, and MSCA when used with TSS ADD/REMOVE
- The ACID types User, Profile, DCA, VCA, ZCA, LSCA, SCA, and MSCA when used with TSS PERMIT/REVOKE
- CTSDB2(OWN) authority to ADD or REMOVE ownership of CTSDB2s from ACIDs
- CTSDB2(XAUTH) authority to PERMIT or REVOKE access to CICS DB2 resources
The administrator can:
- Specify any or all of the following access levels: SET, INQUIRE, ALL, BROWSE, DELETE, NONE, READ, UPDATE, WRITE, INSTALL, and COLLECT. If ACCESS is not specified, CA Top Secret defaults to READ access.
- Use any of the following methods to control access to CICS DB2 resources: Expiration, Facility, PPT Pathing, Time/Day, and Actions.
Copyright © 2014 CA Technologies.
All rights reserved.
 
|
|