z/OS TSO/E Customization
Previous topic | Next topic | Contents | Contact z/OS | Library | PDF


Using CSECTs IKJEFTE2, IKJEFTE8, IKJEFTAP, and IKJEFTNS

z/OS TSO/E Customization
SA32-0976-00

If you choose not to use IKJTSOxx, you can use CSECTs IKJEFTE2, IKJEFTE8, and IKJEFTAP to specify authorized commands and programs, and CSECT IKJEFTNS to specify commands that are not supported in the background. If you update these CSECTs, you must assemble them, link- edit them into load module IKJTABLS in SYS1.LPALIB, and IPL the system before the updates take effect. Table 1 indicates the contents of the CSECTs.

Table 1. Contents of CSECTs IKJEFTE2, IKJEFTE8, IKJEFTAP, and IKJEFTNS
CSECT Table Contents
IKJEFTE2 APFCTABL Names of authorized command processors that the TMP executes
IKJEFTE8 APFPTABL Names of programs that are authorized when invoked via the CALL command
IKJEFTAP APFTTABL Names of programs that are authorized when invoked through the TSO/E service facility
IKJEFTNS NSCPTABL Names of commands not supported in the background.
Note: The tables of authorized commands and programs must start 16 bytes (X'10') into the appropriate CSECT on a doubleword boundary.

Go to the previous page Go to the next page




Copyright IBM Corporation 1990, 2014