Previous topic |
Next topic |
Contents |
Contact z/OS |
Library |
PDF
User-Security-Verification Routine z/OS DFSMS Using Data Sets SC23-6855-00 |
|||||||||||||
If you use VSAM password protection, you can also have your own routine to check a requester's authority. Your routine is invoked from OPEN, rather than via an exit list. VSAM transfers control to your routine, which must reside in SYS1.LINKLIB, when a requester gives a correct password other than the master password. Recommendation: Do not use VSAM password protection. Instead, use RACF or an equivalent product. Through the access method services DEFINE command with the AUTHORIZATION parameter you can identify your user-security-verification routine (USVR) and associate as many as 256 bytes of your own security information with each data set to be protected. The user-security-authorization record (USAR) is made available to the USVR when the routine gets control. You can restrict access to the data set as you choose. For example, you can require that the owner of a data set give ID when defining the data set and then permit only the owner to gain access to the data set. If the USVR is being used by more than one task at a time, you must code the USVR reentrant or develop another method for handling simultaneous entries. When your USVR completes processing, it must return (in register 15) to VSAM with a return code of 0 for authority granted or not 0 for authority withheld in register 15. Table 1 gives the contents of the registers when VSAM gives control to the USVR.
|
Copyright IBM Corporation 1990, 2014
|