Valid on z/OS and z/VM.
Use NODES to control incoming NJE jobs and SYSOUT, and optionally, to assign a userid as the owner of the job or SYSOUT on this system.
When used with TSS ADDTO/REMOVE, this resource class has the following format:
TSS ADDTO(acid) NODES(node,...)
Two to twenty‑six characters
One to five node names or prefixes per TSS command
Generic prefixing allows the administrator to group a set of similar nodes together, and define them by one generic prefix.
When used with TSS PERMIT/REVOKE, this resource class has the following format:
TSS PERMIT(acid) NODES(node(s))
ACCESS(levels)
[NJEACID(acid)]
Two to forty‑four characters
One to five nodes per TSS command
Note: A fully qualified node is PERMITted to an ACID by enclosing in single quotation marks. This will indicate that it is defined to CA Top Secret, not as a prefix, but by its fully qualified name.
This keyword is used with:
The administrator can:
Node masking is another method of reducing the number of node definitions to implement widespread node protection.
This example gives USER01 ownership of jobs submitted from ALPHA2.USERJ:
TSS ADDTO(USER01) NODES(ALPHA.USERJ*)
This example removes ownership:
TSS REMOVE(USER01) NODES(ALPHA.USERJ*)
If node ALPHA is not allowed to execute jobs on node ALPHA.USERJ:
TSS PERMIT(ALL) NODES(ALPHA.USERJ.) ACCESS(NONE)
If an exception is made for userid X123:
TSS PERMIT(ALL) NODES(ALPHA.USERJ.X123) ACCESS(UPDATE)
If any job submitted from node BETA is to run without any password checking:
TSS PERMIT(ALL) NODES(BETA.USERJ) ACCESS(CONTROL)
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|