Valid on z/OS and z/VM.
Use the DOWN control option to determine how jobs are initiated and passwords changed when the CA Top Secret address space is inactive. This control option must be set while CA Top Secret is active.
All entry methods are accepted.
This control option has the following format:
DOWN(facility,action,facility,action,…facility,action)
Identifies the system facility being affected by the DOWN action. Valid values are:
Identifies the action that CA Top Secret performs when its address space is DOWN. Valid values are:
The default is DOWN(BW,SB,TW,OW).
The DOWN options are ignored if CA Top Secret is processing in global DORMANT mode.
This table shows how DOWN actions will affect various CA Top Secret processes.
|
PROCESS |
WAIT |
BYPASS |
FAIL |
NORMAL |
|---|---|---|---|---|
|
Initiation or Logon |
Initiations held and terminals locked |
Security Ignored |
Initiation Terminated |
TSO UADS Password Required |
|
Request for Password change |
Initiations held and terminals locked |
Wait |
Wait |
Wait |
|
TSS command |
Failed |
Failed |
Failed |
Failed |
|
Data set in FAIL mode |
Failed |
BYPASS |
Failed |
Failed |
|
Submit a permitted ACID |
Job submitted without password |
Job submitted without password |
Job submitted without password |
Job submitted without password |
|
TAPE(DEF) processing (volume level) |
Volume access denied |
BYPASS |
Volume access denied |
Volume access denied |
|
Copyright © 2013 CA.
All rights reserved.
|
|