JES resources must be owned before being authorized.
Example: establish JES ownership
This example establishes ownership:
TSS ADDTO(USER01) JESSPOOL(USG203ME)
TSS PERMIT(ALL) JESSPOOL(USG203ME.%)
CA Top Secret will not remove ownership unless all permissions are revoked.
To remove ownership of any JES resource
TSS REVOKE(ALL) JESSPOOL(USG203ME.%)
You cannot specify an access level or the command will fail.
TSS REMOVE(USER01) JESSPOOL(USG203ME)
When the CA Top Secret address space is down, you cannot determine if the JESSPOOL and OPERCMDS resources are owned. If the system is in FAIL mode and the CA Top Secret address space is down, access to these resources are denied.
If your site is running strictly in FAIL mode, these commands allow access to these resources when CA Top Secret is not running:
TSS ADDTO(deptacid) JESJOBS(SUBMIT.,CANCEL.)
TSS ADDTO(deptacid) JESSPOOL(nodename)
TSS ADDTO(deptacid) OPERCMDS(MVS.,JES2.,JES3.)
TSS PERMIT(ALL) JESJOBS(SUBMIT.,CANCEL.)
ACCESS(ALL)
ACTION(PASSWORD)
TSS PERMIT(ALL) JESSPOOL(nodename.)
ACCESS(ALL)
ACTION(PASSWORD)
TSS PERMIT(ALL) OPERCMDS(MVS.,JES2.,JES3.)
ACCESS(ALL)
ACTION(PASSWORD)
TSS PERMIT allows designated users to access the indicated jobs in an unlimited or a restricted manner. Restrictions are indicated with the PERMIT parameter.
To restrict job submission
TSS ADDTO(DEPT01) JESJOBS(SUBMIT.MYNODE.JOB01)
TSS PERMIT(USER01) JESJOBS(SUBMIT.MYNODE.MYJOB.MYACID)
Masking can be used to group jobs whose names share similar characteristics. These shared patterns can then be used as the operands of the JESJOBS parameter in TSS entries.
A masked job name is treated by CA Top Secret like a generic prefix. Any job that begins with a mask is considered a match by the security validation algorithm, and the associated access authorizations are honored.
The access levels that can be specified for jobs are:
Job can be accessed in any way.
Job can be updated; READ and WRITE access is implied.
(Default) Job can be read.
Job can only be written.
Job can be requeued.
Job cannot be used in any way.
You can give an ACID control of another ACID's job during job submission.
Example: alternate ACID control
This example gives the USER01 control of all jobs belonging to USER02:
TSS PERMIT(USER01) JESJOBS(SUBMIT.MYNODE.*.USER02)
To process nodes for SYSOUT
When a node receives a job via NJE, the owning userid is identified first.
If the userid is undefined on the receiving node, the *ALL* record is used to perform the checking.
If the submitting node for the output is the same as the NODES control option the submitting userid is assigned as owner of the output.
After the owner is identified, CA Top Secret generates the resource:
nodes.USERS.user
The name of the node where the SYSOUT was created.
Indicates that the SYSOUT is controlled by the owning userid.
The user that created the job.
If the submitting userid cannot be assigned as the owner, a second check is made against the submitting user for this resource:
snode.USERS.suser
The submitting node.
Indicates that the SYSOUT is controlled by the owning userid.
The submitting user.
During the second check:
To assign ACID NODEA to all output received (via NJE) from node NODEA, enter:
TSS PERMIT(ALL) NODES(NODEA.USERS.) ACCESS(CONTROL) NJEACID(NODEA)
To assign the submitting ACID as the owner of the output of any job originally submitted from this node, and the NJEUSR control option for all other output received, enter:
TSS PERMIT(ALL) NODES(*.USERS.) ACCESS(READ) NJEACID(&SUSER).
To assign the submitting ACID as the owner of the output of any job, no matter what node it was submitted from, enter:
TSS PERMIT(ALL) NODES(*.USERS.) ACCESS(CONTROL) NJEACID(&SUSER).
To assign the NJEUSR control option ACID to all output received (via NJE) from node NODEA, enter:
TSS PERMIT(ALL) NODES(NODEA.USERS.) ACCESS(READ)
The output is purged.
If NJEACID specifies &USER., the submitting node and user is checked. Otherwise, the ACID specified in the NJEUSR control option is used.
If a validated security token exists for the submitting user creating the output, the NJEACID value (or the creating userid if NJEACID was not used) is assigned to the output. Otherwise, READ access is used.
Whether a validated token is available, the NJEACID value or the creating userid is assigned to the output.
In all cases where the access level is greater than ACCESS(NONE), a value of NJEACID(&SUSER). is treated as a special case.
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|