Depending on your security options, submit checking can be done. For these options, see the SECURITY statement.
This command has the following format:
TSS PERMIT(USERID1) ACID(USERID2)
Identifies a CA Top Secret command.
Specifies the CA Top Secret command used to grant access to resources.
Specifies the User ACID to receive submission authority for another ACID.
Specifies the CA Top Secret keyword used to identify a USERID.
Specifies the ACID for which another USER has submission authority.
If you have specified a resource type other than SUBMIT for SCLASS security checking, the checking is done as a generic resource check.
The command to add this resource has the following format (substitute specified value for SUBMIT):
TSS ADD(RDT) RESCLASS(SUBMIT) ATTR(MASK)+ ACLST(NONE,UPDATE,READ,WRITE,CONTROL,CREATE,SCRTCH,ALL) DEFACC(NONE) TSS REPLACE(RDT) RESCLASS(SUBMIT) ATTR(DEFPROT)
The command to permit a user to use this resource has the following format (substitute specified value for SUBMIT):
TSS PERMIT(USERID1) SUBMIT(USERID2) ACCESS(READ)
|
Copyright © 2013 CA Technologies.
All rights reserved.
|
|