Previous Topic

Next Topic

Book Contents

Book Index

Unauthorized access to the CTTTPI utility

The CTTTPI utility provides extensive facilities for protecting against the destruction of active volumes and for recovering information from files that have been partially overwritten.

The utility, which can be accessed only by authorized users, provides the following major functions:

The utility can be used by authorized users only.

You can restrict usage of the CTTTPI utility to a specific started task or user ID. You can also restrict usage of specific CTTTPI utility functions to a specific user ID, using the following command:

$IOAUTL.qname.CTTTPI.function resource

In the preceding example, function can be INITT, TAPEMAP, or TAPERAS.

Parent Topic

Control-M/Tape Security