Symptom:
CPU restrictions are not being honored.
Solution:
Do the following:
TSS LIST(acid) DATA(BASIC,XAUTH,PROFILE)
TSS LIST(ALL) DATA(XA)
If permissions exist which allow the user to access the CPU use the TSS REVOKE and PERMIT commands to define the access.
TSS WHOOWNS CPU(cpu)
If not owned, see the CPU keyword in the Command Functions Guide. If a resource is not owned, CA Top Secret cannot restrict access.
TSS MODIFY(FACILITY(fac))
TSS LIST(acid) DATA(XAUTH,PROFILE)
TSS LIST(ALL) DATA(XAUTH)
The mode might allow access without security checking. Consider moving the user to a more restrictive security mode.
If MSG is not displayed in the LOG field, LOG options are not specified and no messages are being sent to the user.
TSS LIST(acid) DATA(BASIC,PROFILE)
If yes, enter:
TSS REMOVE(acid) NORESCHK
TSS MODIFY (DRC(drc#))
If yes, reset the DRC.
TSS MODIFY(STATUS)
If the user's ACID appears in this list remove the applicable bypass attribute from the user's ACID.
If trace records do not appear for facilities other than TSO, BATCH, or STC the subsystem might not have a working interface with CA Top Secret.
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|