Landmark Lighting D20R2-06/99 User Manual

Page 39

Advertising
background image

Value

Description

V

The function can be secured by tape or DASD
volume.

Note

Only J types currently are used by TMON for CICS. Only J and T
types currently are used by TMON for DB2, TMON for DBCTL,
and TMON for MVS. Only D types currently are used by TMON
for MQSeries.

SECONDARY

Shows the secondary resource type for which a function can be
secured.

TMON for DB2 secondary resources are DB2 plan or package
names. Secondary resources qualify security within the limits of
the primary resource. You can restrict the user plans that can be
reviewed by DB2 subsystem name and plan name within DB2
subsystem using the PLANSUMM function.

TMON for CICS, TMON for DBCTL, TMON for MQSeries, and
TMON for MVS do not use secondary resources for any of their
functions.

TYPE

Displays the function type. Valid function types are “R” and “S”
and are explained under the TYPE VALUES field.

TYPE VALUES

Displays the abbreviations used for the TYPE field shown in the
directory. Valid values are “R” (the function is a resource function
and uses a primary resource) and “S” (the function is a system
function and uses no resources); “R” is the default.

Chapter 2: Security Definitions

Secured Functions Directory

The Monitor for MVS 2.0

2-23

System Administrator’s Guide

Advertising