Previous Topic: DL1B—PSB and DBD SecurityNext Topic: Examples: DOWN control option


DOWN—Inactive Characteristics

Valid on z/OS and z/VM.

Use the DOWN control option to determine how jobs are initiated and passwords changed when the CA Top Secret address space is inactive. This control option must be set while CA Top Secret is active.

All entry methods are accepted.

This control option has the following format:

DOWN(facility,action,facility,action,…facility,action)
facility

Identifies the system facility being affected by the DOWN action. Valid values are:

action

Identifies the action that CA Top Secret performs when its address space is DOWN. Valid values are:

The default is DOWN(BW,SB,TW,OW).

The DOWN options are ignored if CA Top Secret is processing in global DORMANT mode.

This table shows how DOWN actions will affect various CA Top Secret processes.

PROCESS

WAIT

BYPASS

FAIL

NORMAL

Initiation or Logon

Initiations held and terminals locked

Security Ignored

Initiation Terminated

TSO UADS Password Required

Request for Password change

Initiations held and terminals locked

Wait

Wait

Wait

TSS command

Failed

Failed

Failed

Failed

Data set in FAIL mode

Failed

BYPASS

Failed

Failed

Submit a permitted ACID

Job submitted without password

Job submitted without password

Job submitted without password

Job submitted without password

TAPE(DEF) processing (volume level)

Volume access denied

BYPASS

Volume access denied

Volume access denied