You can allow designated users to access the indicated spool data sets in an unlimited or a restricted manner.
Example: protect a spool data set
This example establishes ownership and authorizes access to the spool data set:
TSS ADDTO(DEPT01) JESSPOOL(USG203ME)
TSS PERMIT(USER01) JESSPOOL(MYNODE.USER01.JOB1.STC001.D01)
Masking can be used for spool data sets. For example:
You can give a user the authority to view output that belongs to him regardless of the originating node.
Example: view output
In this example, the first mask, *, can be any node. The second mask, %, indicates that the userid of the signed‑on user must match the userid of any job being accessed:
TSS PERMIT(ALL) JESSPOOL(*.%)
ACCESS(ALL)
You can give users READ access from a particular node to JES spool data sets that they own.
A masked spool data set is treated by CA Top Secret like a generic prefix. Any spool data set that begins with a mask is considered a match by the security validation algorithm, and the associated access authorizations are honored.
Example: access spool data sets
In this example, USG203ME is the node users can access, while % indicates that the userids must match.
TSS PERMIT(ALL) JESSPOOL(USG203ME.%)
The access levels that can be specified for spool data sets are:
Data set can be accessed in any way.
Data set can be updated; READ and WRITE access is implied.
(Default) Data sets can be read.
Data can be requeued.
Data set cannot be used in any way.
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|