

Resources › ROSRES Resource Class—Determine CA Roscoe CA—Vollie Command Ownership
ROSRES Resource Class—Determine CA Roscoe CA—Vollie Command Ownership
Valid on z/OS and z/VSE.
Use ROSRES to determine who has ownership or control over CA Roscoe/VA—Vollie commands.
When used with TSS ADDTO/REMOVE, this resource class has the following format:
TSS ADDTO(acid) ROSRES(resource,...)
- Prefix length
-
One to eight characters
- Capacity of list
-
Five ROSRES resources per TSS command
When used with TSS PERMIT/REVOKE, this resource class has the following format:
TSS PERMIT(acid) ROSRES(resource,...)
- Prefix length
-
One to 44 characters
- Capacity of list
-
Five ROSRES resources per TSS command.
This keyword is used with:
- The commands CREATE, ADDTO, REMOVE, PERMIT, REVOKE, ADMIN, DEADMIN, WHOOWNS, and WHOHAS
- The ROSRES ACID types User, Profile, Department, Division, Zone, DCA, VCA, ZCA, LSCA, SCA, and MSCA when used with TSS ADD/REMOVE
- The ROSRES ACID types User, Profile, DCA, VCA, ZCA, LSCA, SCA, MSCA, and ALL when used with TSS PERMIT/REVOKE
- ROSRES(OWN) authority to protect user access to CA Roscoe ROSRES resources
- ROSRES(XAUTH) authority to permit or revoke access to CA Roscoe resources
The administrator can:
- Use any of the following methods to control access to ROSRES: Expiration, Facility, Time/Day, and Actions.
- Specify the access levels: CREATE, ALL, NONE, READ, UPDATE, and WRITE. If ACCESS is not specified, CA Top Secret defaults to NONE access.
Examples: ROSRES resource class
This example adds a ROSRES of JBS.ROSCMD:
TSS ADDTO(DEPT02) ROSRES(JBS.ROSCMD)
This example removes ownership:
TSS REMOVE(DEPT02) ROSRES(JBS.ROSCMD)
This example allows an ACID to use ROSRES:
TSS PERMIT(DEPT02) ROSRES([rosid.]ROSCMD.,...)
This example revokes access:
TSS REVOKE(DEPT02) ROSRES([rosid.]ROSCMD.,...)
Copyright © 2014 CA Technologies.
All rights reserved.
 
|
|