Examples

SYS1.SAMPLIB member ATBUTIL contains several examples that use the APPC/MVS administration utility to create, maintain, and delete TP profiles and side information. The examples show how to use utility commands to:
  • Add a TP profile for a standard transaction program.
  • Add a TP profile for a system-level multi-trans transaction program.
  • Add two TP profiles for a non-APPC/MVS transaction scheduler.

    In this example, the transaction scheduler name is XYZ, and the XYZ profile has three defined inputs: TRANSACTION_CODE_NAME, SCHEDULE_CLASS, and MAX_REGIONS. The TPSCHED_EXIT keyword specifies a parse routine, XYZEX01, to check input that is specific for the scheduler (if the keyword is omitted, the APPC/MVS transaction scheduler is assumed).

  • Add a TP profile as an alias of an existing TP profile.
  • Modify a TP profile by specifying the TP key and the keyword to be modified.
  • Modify side information by specifying the side information key and the keyword to be modified.
  • Add side information to a VSAM file.
  • Retrieve a TP profile from a VSAM file.
    With the following changes, this example can also show how to retrieve side information:
    • Change the TPRETRIEVE command to SIRETRIEVE
    • Change the SYSSDLIB data set name to one for side information
    • Replace the TP profile key with a side information key.
  • Delete side information from a VSAM file.
    With the following changes, this example can also show how to delete a TP profile:
    • Change the SIDELETE command to TPDELETE
    • Change the SYSSDLIB data set name to one for TP profiles
    • Replace the side information key with a TP profile key.
  • Retrieve TP profile keys from a VSAM file.
    With the following changes, this example can also show how to retrieve side information keys:
    • Change the TPKEYS command to SIKEYS
    • Change the SYSSDLIB data set name to one for side information.
  • Retrieve the database token from a VSAM file.

    For more information about setting the security environment related to RACF® profiles, see Setting up Network Security.

  • Modify the database token in a VSAM file.

    Be careful when changing the database token for an existing VSAM file. See the note at DBMODIFY– Data Base Token Modification for details.