Previous Topic: Controlling Access to CPUsNext Topic: Using the TERMINAL Keyword


Controlling Access to Terminals

Terminals can be protected in three ways:

Online terminals can be defined to CA Top Secret and then have their access selectively authorized. The TERMINAL keyword is used to establish access authorizations and restrictions. To identify an online VM terminal the following conventions are used:

TYPE

PREFIX

EXAMPLE

locally attached

GRAF plus four character local address

TSS ADD(BUDDEPT) TERM(GRAF02BA)

remotely attached VM-controlled network terminals

NETW plus four character resource id

TSS ADD(CORP) TERM(NETW0301)

logical devices

LDEV plus four character address of logical device which is arbitrarily defined

TSS ADD(CORPNET) TERM(LDEV1234)

VTAM/SNA

8 character LU name

TSS ADD(FINDEPT) TERM(xxxxxxxx)

Terminal access protection can be combined with facility limitations, time restrictions, DIALed terminals, etc. to further tailor system entry control.

The CA Top Secret resource class keyword TERMINAL is used to refer to both local and VTAM terminals.