Previous Topic: JES Resource ProtectionNext Topic: Node Protection


Establish JES Ownership

JES resources must be owned before being authorized.

Example: establish JES ownership

This example establishes ownership:

TSS ADDTO(USER01) JESSPOOL(USG203ME)
TSS PERMIT(ALL) JESSPOOL(USG203ME.%)

Remove Ownership of JES

CA Top Secret will not remove ownership unless all permissions are revoked.

To remove ownership of any JES resource

  1. Revoke all permissions for the resource. For example:
    TSS REVOKE(ALL) JESSPOOL(USG203ME.%)
    

    You cannot specify an access level or the command will fail.

  2. Remove the ownership of the JES resource. For example:
    TSS REMOVE(USER01) JESSPOOL(USG203ME)
    

Access to JES in FAIL Mode

When the CA Top Secret address space is down, you cannot determine if the JESSPOOL and OPERCMDS resources are owned. If the system is in FAIL mode and the CA Top Secret address space is down, access to these resources are denied.

If your site is running strictly in FAIL mode, these commands allow access to these resources when CA Top Secret is not running:

TSS ADDTO(deptacid) JESJOBS(SUBMIT.,CANCEL.)
TSS ADDTO(deptacid) JESSPOOL(nodename)
TSS ADDTO(deptacid) OPERCMDS(MVS.,JES2.,JES3.)
TSS PERMIT(ALL) JESJOBS(SUBMIT.,CANCEL.)
                ACCESS(ALL) 
                ACTION(PASSWORD)
TSS PERMIT(ALL) JESSPOOL(nodename.) 
                ACCESS(ALL) 
                ACTION(PASSWORD)
TSS PERMIT(ALL) OPERCMDS(MVS.,JES2.,JES3.) 
                ACCESS(ALL) 
                ACTION(PASSWORD)

Job Submission Restriction

TSS PERMIT allows designated users to access the indicated jobs in an unlimited or a restricted manner. Restrictions are indicated with the PERMIT parameter.

To restrict job submission

  1. Establish ownership of the job using TSS CREATE/ADDTO. For example:
    TSS ADDTO(DEPT01) JESJOBS(SUBMIT.MYNODE.JOB01)
    
  2. Authorize access to the job. For example:
    TSS PERMIT(USER01) JESJOBS(SUBMIT.MYNODE.MYJOB.MYACID)
    

JES Masking

Masking can be used to group jobs whose names share similar characteristics. These shared patterns can then be used as the operands of the JESJOBS parameter in TSS entries.

A masked job name is treated by CA Top Secret like a generic prefix. Any job that begins with a mask is considered a match by the security validation algorithm, and the associated access authorizations are honored.

JES Access Levels

The access levels that can be specified for jobs are:

ALL

Job can be accessed in any way.

UPDATE

Job can be updated; READ and WRITE access is implied.

READ

(Default) Job can be read.

WRITE

Job can only be written.

CONTROL

Job can be requeued.

NONE

Job cannot be used in any way.

Alternate ACID Job Control

You can give an ACID control of another ACID's job during job submission.

Example: alternate ACID control

This example gives the USER01 control of all jobs belonging to USER02:

TSS PERMIT(USER01) JESJOBS(SUBMIT.MYNODE.*.USER02)

SYSOUT Validation

To process nodes for SYSOUT

During the second check:

In all cases where the access level is greater than ACCESS(NONE), a value of NJEACID(&SUSER). is treated as a special case.