Previous Topic: Using Minidisk/Data Set MaskingNext Topic: Using the TSS PERMIT Command


Resource Access Control

Once you have identified your resources to CA Top Secret, the next step is to design access authorizations for each ACID that will need to use those resources. An ACID’s authorization to a resource is determined by the PERMITs found in his user record, in the profile records attached to the user, and the ALL Record (which lists globally accessible resources). Access to ownable resources is restricted through the TSS PERMIT command and can be customized through the use of keywords. Unownable resources are restricted through the TSS ADDTO command and have limited customization capabilities.

This section introduces you to the following: