Landmark Lighting D20R2-06/99 User Manual
Page 114

TMQSPRMS, 3-6
TMVSPRMS, 3-6
Delay Monitor installation verification, 1-4
DELETE command, 2-19, 2-37, 3-22
DELETE field, 2-19, 2-37
session definition, 3-22
DESCRIPTION field, 2-22, 2-38
product, 3-25
product session, 3-22
session definition, 3-19
Detail Profile Definition screen, 2-36 to 2-40
Directories
Profiles/Resources, 2-33 to 2-35
Remote Sessions, 3-18 to 3-20
Secured Functions, 2-21 to 2-23
User Profiles, 2-16 to 2-17
Distributed sample library, A-1
DLYGRP function, 2-25
DLYGRPG function, 2-25
DLYGRPU function, 2-25
DLYMNDET function, 2-25
DLYMON function, 2-25
Documentation
ordering more copies, iv
related manuals, iv to v
submitting comments, vi
DPAUTH function, 2-25
DSNZPDSP function, 2-25
E
ECS
see Electronic Customer Service system (ECS)
EDMSTAT function, 2-25
Electronic Customer Service system (ECS), 4-9
Enhancement requests, 4-10
Error Diagnostic Screen, 4-4
ET tapes, 4-9
Exception Monitor installation verification, 1-3
EXCPDEF function, 2-25
EXCPTDEF function, 2-26
EXCPVIEW function, 2-26
EXPLAIN function, 2-26
Explicit pass-through
accessing products, 3-10
defined, 3-1
description, 3-10 to 3-11
in Landmark PerformanceWorks MVS products, 3-1
JUMP command, 3-11
REMOTE command, 3-11
using, 3-11
see also Landmark product communication
External Security
$DEFAULT profile, 2-7
activating, 2-6 to 2-7
description, 2-4 to 2-7
implementing CA-ACF2 security, 2-4
implementing CA-TOP SECRET security, 2-4
implementing RACF security, 2-5
switching from Internal Security, 2-5
valid combinations with other methods, 2-15
F
FACILITIES field, 2-15
FLDBANAL function, 2-26
FMPROF operand, 3-7
Function access level table, 2-41 to 2-56
Function codes, 2-24 to 2-32
FUNCTION field, 2-22, 2-38
Function IDs, 2-24 to 2-32, 2-37
Function names, 2-24 to 2-32
Function security
defining access levels of functions, 2-21
function codes and names, 2-24 to 2-32
general resource definitions, 2-5
implementing in RACF, 2-5
implementing with Internal Security, 2-36
listing product functions, 2-21
required resources, 2-24 to 2-32
specifying security type, 2-15
using Internal Security with RACF user logon
security, 2-7
Functions
defining security access levels, 2-36
resource, 2-3, 2-34
resources required, 2-24 to 2-32
system, 2-3
viewing in Internal Security, 2-21, 2-36
G
GDCOPTS function, 2-26
General resource definitions, 2-5
Graphic Monitor installation verification, 1-3
Guarantee, customer service satisfaction, 4-1
H
HELPMENU function, 2-26
HISTANL function, 2-26
HLPFLDIR function, 2-26
HLPFLDTL function, 2-26
HLPMSDIR function, 2-26
HLPSLDIR function, 2-26
HLPSLDTL function, 2-26
Index
Index-2