Using internal security – Landmark Lighting D20R2-06/99 User Manual
Page 25

2.
Specify the program name of your user exit in the USEREXIT
startup parameter.
This parameter can be included in a data set or member that is
identified by the:
–
TMONPRMS DD statement in TMON for CICS/ESA and
TMON for CICS/MVS startup JCL
–
TMDBPRMS DD statement in TMON for DB2 startup JCL
–
TDBCPRMS DD statement in TMON for DBCTL
–
TMQSPRMS DD statement in TMON for MQSeries startup
JCL
–
TMVSPRMS DD statement in TMON for MVS startup JCL.
TMON for DB2 example
//TMDBPRMS DD *
USEREXIT=name
If you specify a USEREXIT program name that the product cannot
find when it starts up, an S806 abend occurs.
3.
Stop and restart the product.
Shut down and restart the product.
4.
Activate User Exit Security.
Depending on whether you are using User Exit Security to control
user logon access or access to functions, enter U in either the
USER LOGON field or the FACILITIES field, or both. Check
the user logon/function security type table at the beginning of
this chapter to be sure you are using valid combinations of
security types for these two fields. If no user exit program has
been specified in the USEREXIT startup parameter, an error
occurs indicating you have selected an invalid security
combination.
Using Internal Security
You can use the Internal Security system supplied with your
Landmark PerformanceWorks MVS product to secure user logon
access and access to product functions. If you use Internal Security
to secure logon access, you cannot use External Security to secure
product functions. If you use Internal Security to secure access to
functions, you must secure logon access. You can use any of the
methods described in this chapter to secure logon access.
Internal Security is defined through the screens described in the
rest of this chapter.
Do you require audit trails?
While Internal Security provides complete protection of all secured
functions, it does not produce an audit trail. If your site requires
an audit trail, use External Security to protect access to secured
functions.
Chapter 2: Security Definitions
Using Internal Security
The Monitor for MVS 2.0
2-9
System Administrator’s Guide