In addition to the JESJOBS resource class, an equivalent resource class or functionality is provided for the RACF resource classes shown in the following table.
|
RACF Resource Class |
CA Top Secret Resource Class |
Comments |
|---|---|---|
|
FACILITY |
IBMFAC |
Used to secure IBM facility resources. For example: TSS PERMIT(USER01) IBMFAC(IDC.DIAG) |
|
JESINPUT |
JESINPUT |
Used to secure JES job entry sources checked during job initiation. For example: TSS PERMIT(USER01) JESINPUT(SRCNODE) |
|
JESJOBS |
JESJOBS |
Used to secure submission and cancellation of jobs. For example: TSS PERMIT(USER01) JESJOBS(SUBMIT.MYNODE.MYJOB.MYACID) |
|
JESSPOOL |
JESSPOOL |
Used to secure JES SPOOL data sets (both SYSIN and SYSOUT) in JES2 and JES3. For example: TSS PERMIT(USER01) JESSPOOL(MYNODE.USER01.JOB1.STC001.D01) |
|
NODES |
NODES |
Used to control incoming NJE jobs and output, and to assign a userid as the job's or output's owner. For example: TSS PERMIT(ALL) NODES(*.USERS.) ACCESS(READ) NJEACID(&SUSER). |
|
OPERCMDS |
OPERCMDS |
Used to secure JES and MVS operator commands. For example: TSS PERMIT(USER01) OPERCMDS(MVS.DISPLAY.ACTIVE) |
|
SURROGAT |
ACID |
To PERMIT an ACID to submit a job for another ACID, use the ACID parameter of the TSS PERMIT command. For example: TSS PERMIT(USER01) ACID(USER02) |
|
WRITER |
WRITER |
Used to secure monitoring, routing, and processing of job output to the local devices, RJE stations, or NJE nodes. For example: TSS PERMIT(USER01) WRITER(JES3.NJE.SITE2) |
For information on JES resources, see the JES2 or JES3 Initialization and Tuning Guides.
|
Copyright © 2013 CA Technologies.
All rights reserved.
|
|