Note: To activate the IOA to XBM interface, XBM must be active and at least one of the following parameters: ZIIPXBMO, ZIIPXBMP, or ZIIPXBMA must be set to Y.
A RACF call is made by XBM on the initial request to determine if a user is authorized to perform the requested function. The following RACF profile is used:
BMCXBM.<XBM_SSID>.ZIIP
If this profile is not defined, permission will be granted. More detailed information can be found in the XBM documentation.
Step 2.1 Control-D Security Definitions
Select this step to edit member CTDSRAC2 in the IOA INSTWORK library
Perform the following steps to define the required permissions:
RDEFINE FACILITY $$CTDEDM.qname UACC(NONE)
PERMIT $$CTDEDM.qname ID(USERA) CLASS(FACILITY) ACCESS(READ)
This job must be run under a user who has authorization to enter these commands.
Scan the output of the job for information and error messages. All job steps must end with a condition code of 0.
Step 2.2 Function Security Definitions
Select this step to edit the CTDSRAC3 member in the IOA INSTWORK library. This job contains various definitions for Control‑D. Review the definitions and modify according to your site's requirements.
Step 2.3 Control Program Access to Datasets
Select this step to edit the CTDSRAC4 member in the IOA INSTWORK library. This member contains a sample of the definitions required to define Program Pathing access authorizations to Control‑D datasets.
Review the definitions and modify according to the requirements of your site.
WARNING: BMC recommends that the security administrator first read Limiting Access to Specific Programs and the IBM Resource Access Control Facility Security Administrator’s Guide before submitting this job.
Parent Topic |