Previous Topic: Defining Terminals and Establishing Access AuthorizationsNext Topic: Protection for Control Program (CP) Commands


Using Source-of-Origin Security

Selected users (or profiles) can be forced to log on from a designated terminal. For example, to force USER01 to access the system only from VTAM terminal L1036119, enter a command similar to this one:

TSS ADDTO(USER01)  SOURCE(L1036119)

Note that terminal L1036119 does not even have to be defined to CA Top Secret. However, if the specified terminal is defined, then be sure the user is authorized to access it:

TSS PERMIT(USER01)  TERM(L1036119)

A source-of-origin restriction overrides TERMINAL authorization. That is, if the previous SOURCE function were in place but this TSS PERMIT had been issued:

TSS PERMIT(USER01) TERM(L1036230)

USER01’s attempted logon from L1036230 results in a security violation because USER01 can only log on from L1036119.