z/OS DFSMSrmm Implementation and Customization Guide
Previous topic | Next topic | Contents | Contact z/OS | Library | PDF


Examples: Checking authorization for issuers of RMM TSO subcommands

z/OS DFSMSrmm Implementation and Customization Guide
SC23-6874-00

Example 1: This example shows authorization checking for issuers of RMM TSO subcommands and users of the utilities when a single RACROUTE is issued. The request is issued in the address space of the command issuer or batch utility.
RACROUTE REQUEST=AUTH,CLASS=class,ATTR=level,ENTITY=resource,
         LOG=ASIS
Example 2: This example shows authorization checking for issuers of RMM TSO subcommands and users of the utilities when multiple RACROUTEs are issued. The request is issued in the address space of the command issuer or batch utility.
RACROUTE REQUEST=AUTH,CLASS=class,ATTR=level,ENTITY=resource,
         LOG=NOFAIL
The variables in the examples have these meanings:
class - FACILITY
This field names a 9 character variable. The first byte contains the length of the class name, which follows in the next 8 bytes.
level - READ, UPDATE, CONTROL
Access level as described in Table 1.
resource
This field is 39 characters and contains the name of the resource to which access is being checked.

Go to the previous page Go to the next page




Copyright IBM Corporation 1990, 2014