

Resources › TST Resource Class—Secure CICs Temporary Storage Table Names
TST Resource Class—Secure CICs Temporary Storage Table Names
Valid on z/OS.
Use TST to secure CICS Temporary Storage Table names.
When used with TSS ADDTO/REMOVE, this resource class has the following format:
TSS ADDTO(acid)TST(name)
- Prefix length
-
One to sixteen characters
- Capacity of list
-
One to five prefixes per TSS command
When used with TSS PERMIT/REVOKE, this resource class has the following format:
TSS PERMIT(acid)TST(prefix(es)) ACCESS(access levels)
- Prefix length
-
One to eight characters
- Capacity of list
-
One to five prefixes per TSS command
This keyword is used with:
- The commands CREATE, ADDTO, REMOVE, PERMIT, REVOKE, ADMIN, DEADMIN, WHOHAS, and WHOOWNS
- The TST ACID types User, Profile, Department, Division, Zone, DCA, VCA, ZCA, LSCA, SCA, and MSCA when used with TSS ADD/REMOVE
- The TST ACID types User, Profile, DCA, VCA, ZCA, LSCA, SCA, and MSCA when used with TSS PERMIT/REVOKE
- TST(OWN) authority to ADD or REMOVE TSTs from ACIDs
- TST(XAUTH) authority to permit or revoke access to TSTs
The administrator can:
- Specify the access levels: INQUIRE, SET, ALL, NONE, PURGE, READ, REPLACE, and WRITE. If access in not specified, CA Top Secret defaults to READ access.
- Use any of the following methods to control access to TSTs: Expiration, Facility, Pathing, Time/Day, and Actions.
Copyright © 2009 CA.
All rights reserved.
 
|
|