z/OS TSO/E Programming Services
Previous topic | Next topic | Contents | Contact z/OS | Library | PDF


Overview of the TSO/E Unauthorized Resource Processor Service

z/OS TSO/E Programming Services
SA32-0973-00

Your unauthorized resource processors, the IKJURPS service, and the IKJEFT01 TMP need to fit together to allow your applications to make use of these services. The following provides an overview of this processing.

The IKJEFT01 TMP is capable of processing both authorized and unauthorized commands and programs. It does this by creating separate control layers from which it invokes authorized or unauthorized commands and subtasks. The following descriptions and Figure 1 explain these terms.

The Authorized Control Layer invokes authorized commands and programs as well as initiates the unauthorized control layer.

The authorized control layer invokes authorized commands in an authorized environment. From this environment TSO/E commands and programs can use MVS™ system services that are limited to authorized invokers. This environment is isolated from the unauthorized control layer.

The Unauthorized Control Layer invokes unauthorized commands and programs as well as unauthorized resource processors. Note that the life of the unauthorized control layer is the same as the life of the unauthorized command that this layer invokes. For example, the life of the unauthorized control layer is the same as the life of the unauthorized command invoked from READY.

The unauthorized control layer gives control to the unauthorized resource processors that you write. By receiving control in an unauthorized resource processor, an unauthorized application can share and manage its resources within the unauthorized control layer of the TSO/E TMP. This unauthorized resource processor manages the initialization, resource maintenance, and cleanup for the unauthorized resources within the TSO/E TMP.

In the following figure, AA and BB denote unauthorized commands and subtasks initiated from those commands that execute within the TSO/E address space. These applications can invoke the IKJURPS service that in turn give control to the unauthorized resource processor that you name.

Figure 1. How Unauthorized Resource Processing Fits Into a TSO/E Address Space

Note that the IKJURPS service is an implementation that is specific to the IKJEFT01 TMP, that is, it is available in a foreground TSO/E environment (started though the TSO/E LOGON command) or in a background TSO/E environment (started through EXEC PGM=IKJEFT01). IKJURPS is not available in a non-TSO/E address space.

Go to the previous page Go to the next page




Copyright IBM Corporation 1990, 2014