Previous Topic: Optional System Entry RestrictionsNext Topic: Volume Protection


Protecting Resources

This section contains the following topics:

Resource Classes

Volume Protection

Data Set Protection

Tape Volume Protection

Data Set and Volume Level Security

PDS Member Protection

Console Protection

Terminal Protection

Program Protection

TSO SPF Panel Protection

Application Protection

Record Level Protection (RLP)

Installation Defined Resource Protection

Online Transaction Protection

LCF Security

Screen Level Protection (SLP)

JES Resource Protection

Node Protection

Operator Commands Restriction

Specific Device Output Restrictions

Spool Data Sets Protection

SDSF Resource Protection

Message Queue Manager Protection

DB2 Resource Protection

IBM DCE, SystemView, Netview, and OPTIME Protection

Delegated Resources

SMS Data Fields

Resource Checking Bypass

Resource Classes

The objects that CA Top Secret protects are called resources. Each resource in CA Top Secret is an instance of a Resource Class (RESCLASS) defined in the RDT. Some resource classes can be used in multiple facilities. Other resource classes are specifically defined for individual environments. Resources are used throughout the system to protect the objects and services provided by jobs, tasks, and sessions in multi-user environments.

Most resource classes are defined as GENERIC, which allows all resources with the same prefix to be protected by the same command. A NONGENERIC definition requires complete specification of each resource by individual commands.

Resource classes defined as DEFPROT automatically protect all resources in the class, regardless of whether an explicit command has been issued to establish ownership.

Permission Restrictions

You can restrict permission under the control of the RDT definition:

ACTION

Indicates unusual actions or modes associated with the permission.

ACCESS

Restricts the access levels which are permitted.

LIB

Restricts the program from which the permission is initially executed to a specific data set.

PRIVPGM

Restricts the program from which the permission is initially executed to a specific program.

You can also restrict permission restricted by: