Previous topic |
Next topic |
Contents |
Contact z/OS |
Library |
PDF
Note pad names and SAF authorization z/OS MVS Programming: Sysplex Services Guide SA23-1400-00 |
|
Programs require appropriate SAF (System Authorization Facility) authorization to the FACILITY class resource IXCNOTE.owner.application when creating, deleting, or querying a note pad, and when creating a connection to a note pad. The owner and application are derived from the note pad name.
If your program runs unauthorized, the installation must define a SAF profile that grants your program the access it needs to be able to issue its IXCNOTE requests for your note pad. If SAF is not installed, or no SAF profile is defined for your note pad, your program will not be able to use the note pad. Otherwise, XCF honors whatever decision is returned by SAF. If SAF determines that your program has the required access, XCF permits the IXCNOTE request to be processed. If SAF determines that your program does not have access, XCF rejects the IXCNOTE request. If your program runs authorized, XCF calls SAF to determine whether your program has been granted the access needed to issue its IXCNOTE requests. If SAF is not installed, or the installation has not defined a SAF profile for your note pad, XCF permits the request to go forward (because it is running authorized). However, if your program is permitted to create a note pad connection in this manner, your program must be running authorized when it issues an IXCNOTE request for that connection. If SAF is installed and the installation has defined a SAF profile for your note pad, XCF honors whatever decision is returned by SAF. If SAF determines that your program has the required access, XCF permits the IXCNOTE request to be processed. If SAF determines that your program does not have access, XCF rejects the IXCNOTE request. The installation and configuration documentation for your application should indicate what the installation needs to provide in the way of SAF profiles to enable your application and its component programs to have appropriate access rights. |
Copyright IBM Corporation 1990, 2014
|