Previous Topic: Jobs Submission Through Job SchedulersNext Topic: NODES Check


Securing JES Related Resources

In addition to the JESJOBS resource class, an equivalent resource class or functionality is provided for the RACF resource classes shown in the following table.

RACF Resource Class

CA Top Secret Resource Class

Comments

FACILITY

IBMFAC

Used to secure IBM facility resources.

For example:

TSS PERMIT(USER01) IBMFAC(IDC.DIAG)

JESINPUT

JESINPUT

Used to secure JES job entry sources checked during job initiation.

For example:

TSS PERMIT(USER01) JESINPUT(SRCNODE)

JESJOBS

JESJOBS

Used to secure submission and cancellation of jobs.

For example:

TSS PERMIT(USER01)

JESJOBS(SUBMIT.MYNODE.MYJOB.MYACID)

JESSPOOL

JESSPOOL

Used to secure JES SPOOL data sets (both SYSIN and SYSOUT) in JES2 and JES3.

For example:

TSS PERMIT(USER01)

JESSPOOL(MYNODE.USER01.JOB1.STC001.D01)

NODES

NODES

Used to control incoming NJE jobs and output, and to assign a userid as the job's or output's owner.

For example:

TSS PERMIT(ALL) NODES(*.USERS.)

ACCESS(READ) NJEACID(&SUSER).

OPERCMDS

OPERCMDS

Used to secure JES and MVS operator commands.

For example:

TSS PERMIT(USER01)

OPERCMDS(MVS.DISPLAY.ACTIVE)

SURROGAT

ACID

To PERMIT an ACID to submit a job for another ACID, use the ACID parameter of the TSS PERMIT command.

For example:

TSS PERMIT(USER01) ACID(USER02)

WRITER

WRITER

Used to secure monitoring, routing, and processing of job output to the local devices, RJE stations, or NJE nodes.

For example:

TSS PERMIT(USER01) WRITER(JES3.NJE.SITE2)

For information on JES resources, see the JES2 or JES3 Initialization and Tuning Guides.