Previous Topic: The Inclusive ApproachNext Topic: Owned Transaction Security for MVS and VSE


The Exclusive Approach

The exclusive approach allows an ACID to use all but a specific list of restricted commands for a particular facility. For example:

TSS ADDTO(USER01) XCMDS(TSO,(SPF2))

allows USER01 to use all TSO commands except the SPF EDIT (SPF2) panel.

Through LCF, you can assign authorizations and restrictions to transactions on a user-by-user basis without impacting other users. However, because transactions controlled with LCF are not owned, if factors such as administrative scope and resource auditing capabilities are considered highly important for your security environment, an LCF-based approach to transaction security may not be the best approach for you.