

Extending Security Through Site Security Exits › Customization Ideas
Customization Ideas
CA Top Secret lets you create security checks which bypass, replace, or enhance normal security validation with TSSINSTX. You can use TSSINSTX to:
- Provide additional job card parameter validations:
- JES2 Initiator class authorizations
- Job priority authorizations
- Account number information
- Limit TSO usage by department.
- Maintain CA‑Roscoe usage statistics based on the time‑of‑day session‑Roscoe/ * * signoff.
- Verify voice/image for online session signon.
- Provide implicit data set prefix security for DASD management archiving data sets.
- Use “pseudo data set names” to provide other resources with the flexibility of data set name security. This is useful in controlling access to members in a library management package (for example, CA‑Panvalet, CA‑Librarian, or CA‑Endeavor).
- Eliminate the logging of BYPASS events as desired by the installation to reduce ATF logging.
Sample code for these uses is in the AAKOSRC0 member TSSINST1.
Copyright © 2014 CA Technologies.
All rights reserved.
 
|
|