Previous Topic: TSSREPT Selection ScreenNext Topic: TSSCPR Utility


TSSREPT Option 2

Reports A through D are described on the following pages. Input parameters, if any, appear in the boxes and are followed by definitions of both required and optional parameters. The following OUTPUT FIELDS define the headers that appear on the report output.

The DATE format for each report is MM/DD/YY. This can be modified with the CA-EARL installation options.

 CAKV-R002              CA Top Secret Report Facility                   TSSREPT
===>

Select the type of UTILX request:  (2)        (3)                     (4)
  _ dynamic, from TSS server: TSSVM___ node: ________ with password:
(1)    TSSUTIL command(s) or _ command file TSSREPT_ TSSLIST_ A_ to execute:
                            (6)                       (7)
    REPORT EARLOUT_____________________________________________________________
    _______(5)_________________________________________________________________
    ___________________________________________________________________________
 (8)                                                                      (9)
  _ static, UTILX in virtual reader, enter the jobid of its TSSUTIL  JOB: ____
(10)   _ Check here to save UTILX as: TSSUTILX SAVED___ A_ (11)
  _ static, UTILX on minidisk, enter its CMS fileid: TSSUTILX SAVED___ A_
(12)                                                                (13)

                                                               (14)
Select the TSS report ( v - view, s - create and save as TSSREPTn LISTING_ A_ )
  _ Report A: # violations by VMMD/DSN  _ Report B: VMMD/DSN violations
  _ Report C: Password violations       _ Report D: Terminal violations
(15)                                    _ Report produced by EARL pgm: __(16)__
    Input parameter for EARL (if any): ________________________________________
PF1=Help       2=           3=End         4=Return     5=Execute    6=
PF7=SaveCurr   8=GetSaved   9=Refresh    10=          11=          12=Cursor

The following information is presented in the display:

Note: This screen is a two-step process: The upper part of the screen about the UTILX request must be filled in first. Interactive messages will guide you through the process. When the PUN and PRT files are returned, you can then fill in the lower portion of the screen about the CA Top Secret report selection.

PF Key

Assignment

PF1=Help

Invokes the Help Facility

PF2

Not applicable for TSSREPT

PF3=End

Exits TSSREPT

PF4=Return

Exits TSSREPT

PF5=Execute

Performs the selected action

PF6

Not applicable for TSSREPT

PF7=SaveCurr

Saves the current entered values

PF8=GetSaved

Re-displays the saved values

PF9=Refresh

Re-displays screen, no previous entries are saved

PF10

Not applicable for TSSREPT

PF11

Not applicable for TSSREPT

PF12=Cursor

Moves cursor between command line and previous screen position

REPORT A - DATA SET VIOLATIONS

Generates a list of all violations against data sets. This list is sorted by ACID and indicates the number of violations per data set.

PARM=

There are no input parameters for this report.

Output fields are as follows:

ACID

Lists the ACID responsible for the data set violation.

DATASET NAME

Lists the name of the data set the user attempted to access.

VIOLATIONS

Lists the number of violations against each data set.

For TSSUTIL report selection criteria you would select:

EVENT(VIOL).

REPORT B - REQUESTED VS. ALLOWED ACCESS

Lists all access violations against each data set and indicates which ACID requested access, what type of access was requested and what access level was allowed for that ACID. This list is sorted according to data set name.

PARM=

There are no input parameters for this report.

Output fields are as follows:

DATE

Indicates the date when the ACID attempted to access the data set.

TIME

Indicates the time at which access was attempted.

DATASET NAME

Indicates which data set the ACID attempted to access.

ACID

Indicates the ACID which incurred the violation.

REQ ACCESS

Indicates what access level the ACID requested to the data set.

ALLOWED ACCESS

Indicates the actual level at which the ACID is allowed to access the data set.

For TSSUTIL report selection criteria you would specify:

EVENT(VIOL).
mm/dd/yy                        ADMI

REPORT C - PASSWORD VIOLATIONS

Lists all ACIDs that have received password violations.

PARM=

There are no input parameters for this report.

Output fields are as follows:

DATE

Lists the date that the violation occurred.

TIME

Lists the time that the violation occurred.

ACID

Indicates which ACID incurred the violation.

TSSTEXT

Details, in plain language rather than in DRC code numbers, the type of password violation which occurred.

For TSSUTIL report selection criteria you would specify:

EVENT(VIOL).

REPORT D - TERMINAL VIOLATIONS

Generates a list of all terminal violations. The type of violation will be explained in text, not by DRC code.

PARM=

There are no input parameters for this report.

Output fields are as follows:

DATE

Indicates the date on which the violation occurred.

TIME

Indicates the time that the violation occurred.

TERM ID

Indicates the terminal at which the violation occurred.

TSSTEXT

Details the type of violation that occurred.

For TSSUTIL report selection criteria you would specify:

EVENT(VIOL) RES(TERM)