Valid on z/OS.
Use SERVAUTH to protect TCP/IP resources from unauthorized access.
When used with TSS ADDTO/REMOVE, this resource class has the following format:
TSS ADDTO(acid) SERVAUTH(resource)
One to eight characters
One to fives prefixes per TSS command.
When used with TSS PERMIT/REVOKE, this resource class has the following format:
TSS PERMIT(acid) SERVAUTH(resource)
One to 64 characters
One to five prefixes per TSS command.
This keyword is used with:
The administrator can use any of the following methods to control access to SERVAUTH resources: Expiration, Facility, Program Pathing, Time/Day, and Actions.
This example protects resources by using CA Top Secret, by assigning ownership to the Corporate Department (owning acid):
TSS ADDTO(CORPORAT) SERVAUTH(EZB.)
The administration may now PERMIT access to users or profiles that requires access.
This example removes ownership:
TSS REMOVE(CORPORAT) SERAUTH(EZB.)
This example permits users in the Technical Services Department to access TCP/IP stack:
TSS PERMIT(acid) SERAUTH(EZB.STACKACCESS.)
ACCESS(READ)
This example revokes access:
TSS REVOKE(acid) SERVAUTH(EZB.STACKACCESS.)
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|