z/OS ISPF Software Configuration and Library Manager Guide and Reference
Previous topic | Next topic | Contents | Contact z/OS | Library | PDF


Step 3: Establish authorization codes

z/OS ISPF Software Configuration and Library Manager Guide and Reference
SC19-3625-00

Authorization codes control the movement of data within the hierarchy. The purpose of this step is to assign authorization codes to the hierarchy. Authorization codes restrict the draw down and promotion of members to certain groups within the hierarchy.

At least one authorization code must be defined for a project. If no authorization codes are defined, SCLM will not permit members to be drawn down or promoted. Authorization codes work only on editable types such as source, not on build outputs. Authorization codes are assigned to each group in the hierarchy. Groups can have any number of authorization codes assigned to them. Members are assigned authorization codes when they are registered with SCLM. Members can only exist in groups that have been assigned the same authorization codes as the members.

It is not necessary to define more than one authorization code for the entire project. A single authorization code allows each member under SCLM control to be drawn down to any development group and be promoted to the top of the hierarchy. If tighter restrictions on the movement of your data are required for your project, you must identify those situations and define additional authorization codes.

An example of when multiple authorization codes can be used is when an application has multiple subsystems being developed in different legs of the hierarchy and you need to ensure that the members of the two subsystems do not get mixed in the development groups in the hierarchy legs. Authorization codes can be set up to prevent the members from one subsystem from being drawn down into the development groups of the other subsystem. This requires at most two authorization codes. For additional possible uses of authorization codes, see Using authorization codes to control SCLM operations.

Using the diagram that you drew for Step 1, examine the flow of members and determine if any restrictions on the movement of members are required. Label each group with at least one authorization code. Authorization codes can be up to 8 characters and cannot contain commas.

Go to the previous page Go to the next page




Copyright IBM Corporation 1990, 2014