Controlling Alternate Access
To control access to Alternate Access
Define resource BOOLEBBV to your ESM with a Universal Access of NONE.For example, for RACF specify the following TSO command:
RDEFINE FACILITY (BOOLEBBV) UACC(NONE)
Permit each user ID that will use an AutoLogon session to have READ access to resource BOOLEBBV.For RACF specify the following TSO command:
PERMIT BOOLEBBV CLASS(FACILITY) ID(userID) ACCESS(READ)
For more detailed information about Alternate Access security, including information about defining additional security for terminals or applications, see Security-implementation-for-Alternate-Access.
Examples
The examples in this section show how to use CA ACF2 and CA Top Secret to protect resource BOOLEBBV.
For CA ACF2, use the following TSO commands to define resource BOOLEBBV and allow selected user IDs to access it:
ACF
SET RESOURCE(FAC)
COMPILE * LIST STORE
$KEY(BOOLEBBV) TYPE(FAC)
UID(UID string) ALLOW
UID(-) PREVENT
END
END
For CA Top Secret, use the following TSS ADDTO command to add resource BOOLEBBV to class IBMFAC:
TSS ADDTO(owner-acid) IBMFAC(BOOLEBBV)
Use the following TSS PERMIT command to permit selected ACIDs to have READ access to BOOLEBBV:
TSS PERMIT(acid) IBMFAC(BOOLEBBV) ACCESS(READ)