Step 2.1 Control-O Security Definitions
Step 2.2 Function Security Definitions
Step 2.3 Control Program Access to Datasets
Select these steps to edit members CTOSRAC2, CTOSRAC3, and CTOSRAC4.
Perform the following steps to define the required permissions.
RDEFINE FACILITY $$CTOEDM.qname UACC(NONE)
PERMIT $$CTOEDM.qname ID(USERA) CLASS(FACILITY) ACCESS(READ)
This job must be run under the user ID of an administrator who has authorization to enter these commands.
For more information about entities and user authorizations, see Control-O Basic Definition Security Calls, and Control-O Extended Definition Security Calls.
To define and authorize the entity in Extended Definition mode to protect ordering of Control‑O rules beginning with SYS, specify the following command:
RDEFINE FACILITY $$CTOORD.qname.SYS* UACC(NONE)
PERMIT $$CTOORD.qnam.SYS* CLASS(FACILITY) ID(USERA) ACCESS(READ)
where qname is the name used to assign different authorizations to different Control‑O environments (for example, Test and Production). This parameter is specified during IOA installation.
To authorize USERA access to a given Control‑O entity, use the following command:
PERMIT $$CTOnnn.qname CLASS(FACILITY) ID(USERA) ACCESS(READ)
where CTOnnn is the name of the Control‑O entity to be accessed.
All entity names for each Control‑O protected element appear in Basic Definition Mode and Extended Definition Mode.
For samples of user authorizations, review member CTOSRAC3 in the IOA INSTWORK library.
Parent Topic |