Valid on z/OS and z/VM.
Use the DOWN control option to determine how jobs are initiated and passwords changed when the CA Top Secret address space is inactive. This control option must be set while CA Top Secret is active.
All entry methods are accepted.
This control option has the following format:
DOWN(facility,action,facility,action,…facility,action)
Identifies the system facility being affected by the DOWN action. Valid values are:
Identifies the action that CA Top Secret performs when its address space is DOWN. Valid values are:
The default is DOWN(BW,SB,TW,OW).
The DOWN options are ignored if CA Top Secret is processing in global DORMANT mode.
The following table shows how DOWN actions affect various CA Top Secret processes:
|
PROCESS |
WAIT |
BYPASS |
FAIL |
NORMAL |
|---|---|---|---|---|
|
Initiation or Logon |
Initiations held and terminals locked |
Security Ignored |
Initiation Terminated |
TSO UADS Password Required |
|
Request for Password change |
Initiations held and terminals locked |
Wait |
Wait |
Wait |
|
TSS command |
Failed |
Failed |
Failed |
Failed |
|
Data set in FAIL mode |
Failed |
BYPASS |
Failed |
Failed |
|
Submit a permitted ACID |
Job submitted without password |
Job submitted without password |
Job submitted without password |
Job submitted without password |
|
TAPE(DEF) processing (volume level) |
Volume access denied |
BYPASS |
Volume access denied |
Volume access denied |
This example shows how the default DOWN(BW,SB,TW,OW) forces CA Top Secret to process security when its address space is down.
Batch jobs and password changes (B) will wait for CA Top Secret to be reactivated (W).
STC initiations (S) will bypass security checking (B).
TSO logons and password changes (T) will wait for CA Top Secret to be reactivated (W).
Online initiations and password changes (O) will wait for CA Top Secret to be reactivated (W).
Note: An action of B normally indicates to bypass all security. However, a TSO logon with a DOWN option of TB in effect will result in the UADS password for the user being checked.
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|