Using internal security – Landmark Lighting D20R2-06/99 User Manual

Page 25

Advertising
background image

2.

Specify the program name of your user exit in the USEREXIT
startup parameter.

This parameter can be included in a data set or member that is
identified by the:

TMONPRMS DD statement in TMON for CICS/ESA and
TMON for CICS/MVS startup JCL

TMDBPRMS DD statement in TMON for DB2 startup JCL

TDBCPRMS DD statement in TMON for DBCTL

TMQSPRMS DD statement in TMON for MQSeries startup
JCL

TMVSPRMS DD statement in TMON for MVS startup JCL.

TMON for DB2 example

//TMDBPRMS DD *

USEREXIT=name

If you specify a USEREXIT program name that the product cannot
find when it starts up, an S806 abend occurs.

3.

Stop and restart the product.

Shut down and restart the product.

4.

Activate User Exit Security.

Depending on whether you are using User Exit Security to control
user logon access or access to functions, enter U in either the
USER LOGON field or the FACILITIES field, or both. Check
the user logon/function security type table at the beginning of
this chapter to be sure you are using valid combinations of
security types for these two fields. If no user exit program has
been specified in the USEREXIT startup parameter, an error
occurs indicating you have selected an invalid security
combination.

Using Internal Security

You can use the Internal Security system supplied with your
Landmark PerformanceWorks MVS product to secure user logon
access and access to product functions. If you use Internal Security
to secure logon access, you cannot use External Security to secure
product functions. If you use Internal Security to secure access to
functions, you must secure logon access. You can use any of the
methods described in this chapter to secure logon access.

Internal Security is defined through the screens described in the
rest of this chapter.

Do you require audit trails?

While Internal Security provides complete protection of all secured
functions, it does not produce an audit trail. If your site requires
an audit trail, use External Security to protect access to secured
functions.

Chapter 2: Security Definitions

Using Internal Security

The Monitor for MVS 2.0

2-9

System Administrator’s Guide

Advertising