Before the CA VM:Director server can operate with an ESM, the ESM must be configured to enable the server to have access to certain system resources. The way in which access is granted depends on the specific ESM product being used.
The following lists the CA Top Secret for z/VM commands needed to give CA VM:Director access to the resources it needs to operate.
The ESM provides access to:
TSS CREATE(VMDIRECT) NAME('VMDIRECT') DEPT(VMSYSTM) PASS(password) TYPE(USER)
TSS CREATE(VMX$0001) NAME('VMX$0001') DEPT(VMSYSTM) PASS(password) TYPE(USER)
TSS CREATE(VMX$0002) NAME('VMX$0002') DEPT(VMSYSTM) PASS(password) TYPE(USER)
TSS ADDTO(VMDIRECT) VMMDISK(VMDIRECT.) TSS ADDTO(VMX$0001) VMMDISK(VMX$0001.) TSS ADDTO(VMX$0001) VMMDISK(VMX$0001.)
TSS PERMIT(VMDIRECT) VMMDISK($DASD$.004) ACCESS(MREAD)
TSS PERMIT(VMX$0001) VMMDISK(VMDIRECT.0194) ACCESS(READ) TSS PERMIT(VMX$0002) VMMDISK(VMDIRECT.0194) ACCESS(READ)
TSS ADDTO(xxxxxxxx) VMMACH(VMDIRECT) TSS PERMIT(OPERATOR) VMMACH(VMDIRECT) ACCESS(AUTOLOG) TSS PERMIT(AUTOLOG1) VMMACH(VMDIRECT) ACCESS(AUTOLOG)
TSS ADDTO(xxxxxxxx) VMMACH(VMX$0001) TSS ADDTO(xxxxxxxx) VMMACH(VMX$0002) TSS PERMIT(VMDIRECT) CPCMD(AUTOLOG) TSS PERMIT(VMDIRECT VMMACH(VMX$0001) ACCESS(AUTOLOG) TSS PERMIT(VMDIRECT VMMACH(VMX$0002) ACCESS(AUTOLOG)
TSS PERMIT(VMDIRECT) DIAG(A0) ACTION(VMPRIV)
|
Copyright © 2014 CA.
All rights reserved.
|
|