Define CTMAS security in the following steps.
CTMAS security uses the IOASE07 and IOASE32 IOA security modules, as well as the CTMSE08 Control‑M security module, when IOA and Control‑M security interfaces are installed. Therefore, to complete CTMAS security, only the required definitions are necessary.
Define a Logon ID for the CTMAS started task with a multi-user address space (MUSSAS) parameter.
SET RESOURCE(CMF)
COMP
$KEY($$ECSnnn.qname)
UID(USERA) ALLOW
where ECSnnn is the name of the CTMAS entity to be accessed.
All entity names for each CTMAS protected element are described in CTMAS Basic Definition Security Calls, for Basic Definition mode, and in CTMAS Extended Definition Security Calls, for Extended Definition mode.
For samples of user authorizations, review member ECSSSAF3 in the IOA INSTWORK library.
Verify that all job steps complete with a condition code of zero.
This job must be run under a user of an ACF2 administrator who is authorized to enter these ACF2 commands.
Scan the output of the job for information and error messages produced by ACF2. All job steps must end with a condition code of 4 or less.
Parent Topic |