

Resources › LOGSTRM Resource Class—Secure System Logger
LOGSTRM Resource Class—Secure System Logger
Valid on z/OS
Used LOGSTRM to secure the system logger CICS resources.
When used with TSS ADDTO/REMOVE, this resource class has the following format:
TSS ADDTO(acid) LOGSTRM(oper,oper,oper,...)
- Prefix length
-
One to eight characters
- Capacity of list
-
One to five LOGSTRM prefixes per TSS command
When used with TSS PERMIT/REVOKE, this resource class has the following format:
TSS PERMIT(acid) LOGSTRM(prefix(es))
ACCESS(access levels)
- Prefix length
-
One to forty‑four characters
- Capacity of list
-
One to five prefixes per TSS command
This keyword uses:
- The commands ADDTO, REMOVE, PERMIT, REVOKE, ADMIN, DEADMIN, WHOOWNS, and WHOHAS
- The LOGSTRM ACID types User, Profile, Department, Division, Zone, DCA, VCA, ZCA, LSCA, SCA, and MSCA when used with TSS ADD/REMOVE
- The LOGSTRM ACID types User, Profile, DCA, VCA, ZCA, LSCA, SCA, and MSCA when used with TSS PERMIT/REVOKE
- LOGSTRM(OWN) authority to ADD or REMOVE ownership of LOGSTRMs from ACIDs
- LOGSTRM(XAUTH) authority to permit or revoke access to LOGSTRMs
The administrator can:
- Specify the access levels: CONTROL, ALL, NONE, READ, UPDATE, ALTER. If ACCESS is not specified, CA Top Secret defaults to READ access
- The administrator can use any of the following methods to control access to LOGSTRMs: Expiration, Facility, Time/Day, and Actions.
Copyright © 2014 CA Technologies.
All rights reserved.
 
|
|