z/OS DFSMS Introduction
Previous topic | Next topic | Contents | Contact z/OS | Library | PDF


The DFSMShsm AUTH Command Environment

z/OS DFSMS Introduction
SC23-6851-00

Commands within DFSMShsm are classified as authorized and nonauthorized.

Authorized commands can be issued only by a user specifically authorized by a storage administrator. Generally, authorized commands can affect data sets not owned by the person issuing the command and should, therefore, be limited to only those whom you want to have that level of control.

Nonauthorized commands can be issued by any user, but they generally affect only those data sets for which the user has appropriate security access. Nonauthorized commands are usually issued by system users who want to manage their own data sets with DFSMShsm user commands.

For more information about establishing an AUTH command environment, see z/OS DFSMShsm Implementation and Customization Guide.

Go to the previous page Go to the next page




Copyright IBM Corporation 1990, 2014