

Resources › JESINPUT Resource Class—Secure JES Job Entry Sources
JESINPUT Resource Class—Secure JES Job Entry Sources
Valid on z/OS.
Use JESINPUT to secure JES job entry sources checked during job initiation.
When used with TSS ADDTO/REMOVE, this resource class has the following format:
TSS ADDTO(acid) JESINPUT(srcnode)
- Prefix length
-
Two to twenty‑six characters
- Capacity of list
-
One to eight prefixes per TSS command
When used with TSS PERMIT/REVOKE, this resource class has the following format:
TSS PERMIT(acid) JESINPUT(srcnode)
- Prefix length
-
Two to forty‑four characters
- Capacity of list
-
One to eight prefixes per command
This keyword uses:
- The commands CREATE, ADDTO, REMOVE, PERMIT, REVOKE, ADMIN, DEADMIN, WHOHAS, and WHOOWNS
- The JESINPUT ACID types User, Profile, Department, Division, Zone, DCA, VCA, ZCA, LSCA, SCA, and MSCA when used with TSS ADD/REMOVE
- The JESINPUT ACID types User, Profile, Department, Division, Zone, DCA, VCA, ZCA, LSCA, SCA, and MSCA when used with TSS PERMIT/REVOKE
- JESINPUT(OWN) authority to ADD or REMOVE access for JES job sources for ACIDs
- JESINPUT(XAUTH) authority to permit or revoke access to JESINPUT sources
The administrator can:
- Specify the access levels: ALL, NONE, READ, UPDATE, and CONTROL. If ACCESS is not specified, CA Top Secret defaults to READ access.
- Use any of the following methods to control access to JESINPUT: Expiration, Facility, Time/Day, and Actions.
Note: Only z/OS, ESA release 3.1.3 and above offer support for all resources.
Masking
Masking is not supported for JESINPUT.
Examples: JESINPUT resource class
This example adds ownership for USER01:
TSS ADDTO(USER01) JESINPUT(srcnode)
This example removes ownership:
TSS REMOVE(USER01) JESINPUT(srcnode)
Copyright © 2014 CA Technologies.
All rights reserved.
 
|
|