

Resources › CIMS Resource Class—Secure IMS Commands
CIMS Resource Class—Secure IMS Commands
Valid on z/OS.
Use CIMS to secure IMS commands.
This resource class has the following format for TSS ADDTO/REVOKE
TSS ADDTO(acid) CIMS(command,...)
- Command length
-
Three‑character IMS verb
- Capacity of list
-
One to five commands per TSS command
When used with TSS PERMIT/REVOKE, this resource class has the following format:
TSS PERMIT(acid) CIMS(command,...)
- Command length
-
Three characters
- Capacity of list
-
One to five commands per TSS command
CIMS is used with:
- The commands ADDTO, REMOVE, PERMIT, REVOKE, ADMIN, DEADMIN, WHOOWNS, and WHOHAS
- The ACID types User, Profile, Department, Division, Zone, DCA, VCA, ZCA, LSCA, SCA, and MSCA when used with TSS ADD/REMOVE
- The ACID types User, Profile, DCA, VCA, ZCA, LSCA, SCA, and MSCA when used with TSS PERMIT/REVOKE
- CIMS(OWN) authority to ADD or REMOVE ownership of CIMS resources from ACIDs
- CIMS(XAUTH) authority to PERMIT or REVOKE access to CIMS resources
The administrator can:
- Use any of the following methods to control access to CIMS resources: Expiration, Program Pathing, Time/Day, and Actions
- Specify the access levels None and ALL
Prefixing is supported. Masking is not.
Copyright © 2009 CA.
All rights reserved.
 
|
|