ADDing the NORESCHK attribute to an ACID allows that user to bypass all security checks for all resources except OS/DOS data sets and alternate ACIDs. For example:
TSS ADDTO(USER10) NORESCHK
Since NORESCHK is a very powerful attribute, its use must be carefully restricted. Note that auditing is also bypassed for resources accessed via NORESCHK (other than data sets and volumes).
To rescind a user’s resource security checking bypass privilege, use a TSS REMOVE function. For example:
TSS REMOVE(USER10) NORESCHK
The administrative authority required to ADD/REMOVE the NORESCHK attribute is MISC9(BYPASS).
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|