In the previous example, the ACCEss keyword was used to specify that USER02 has UPDATE access to the data set. The types of access levels to which you can restrict a user depend on the type of resource class involved, but some of the more common access levels are:
For resources such as CICS and IMS databases,CA Top Secret recognizes access level keywords that correspond to the actual system terminology (such as BROWSE, REPLACE, PURGE, and FEOV).CA Top Secret also uses three access level determinations that you may not be familiar with. They are:
For a data set this allows VSAM control interval processing. For a volume, when used with CREATE, this allows the creation of data regardless of ownership.
Enables access to a program library (load library) for the purposes of executing programs.
Lets a user access a tape bypassing the information kept in the label of that physical tape.
| Copyright © 2011 CA. All rights reserved. | Tell Technical Publications how we can improve this information |