Previous Topic: Restricting Access by “Path”

Next Topic: Restricting Access by SMFID

Restricting Access by Levels

In the previous example, the ACCEss keyword was used to specify that USER02 has UPDATE access to the data set. The types of access levels to which you can restrict a user depend on the type of resource class involved, but some of the more common access levels are:

For resources such as CICS and IMS databases,CA Top Secret recognizes access level keywords that correspond to the actual system terminology (such as BROWSE, REPLACE, PURGE, and FEOV).CA Top Secret also uses three access level determinations that you may not be familiar with. They are:

CONTROL

For a data set this allows VSAM control interval processing. For a volume, when used with CREATE, this allows the creation of data regardless of ownership.

FETCH

Enables access to a program library (load library) for the purposes of executing programs.

BLP

Lets a user access a tape bypassing the information kept in the label of that physical tape.