Setting up and customizing the TSO/E environment

When setting up and customizing TSO/E, you must perform certain tasks before users can use TSO/E. Other customization tasks are optional and can be done at any time. This part describes how to set up and customize TSO/E. For more information about TSO/E customization and required and optional customization tasks, see Introduction.

Before users can use TSO/E, you must define TSO/E to an access method, VTAM®. After you complete the definitions, you can customize how TSO/E operates with VTAM. Defining and customizing TSO/VTAM and TSO/TCAM time sharing describes the tasks you perform to define and tailor the access methods.

Users must have access to the system before they can log on. You must write at least one logon procedure that users can use to log on to the system. Setting up logon processing describes how you control system access, limit address space size, and write logon procedures for different types of users.

You can customize the logon process in many ways. You can tailor logon messages and the use of the reconnect option. With RACF® installed, you can define security labels and users can specify a security label (SECLABEL) for their TSO/E session when they log on. You can also hold and purge the SYSOUT data set that logon processing creates and limit the number of times TSO/E prompts a user for logon information. Customizing the logon and logoff process describes how to customize logon processing, including writing a logon pre-prompt exit and a logoff exit, and different ways you may improve performance during logon.

If your installation uses ISPF and ISPF/PDF, you must define TSO/E to ISPF and ISPF/PDF. You must write a logon procedure that allocates the required data sets. You can also specify which TSO/E commands users can issue from ISPF/PDF panels. If your installation uses Session Manager, you can define the Session Manager to ISPF/PDF so users can use Session Manager from ISPF/PDF. Defining TSO/E to ISPF and ISPF/PDF describes how to perform these tasks.

To allow users to issue authorized commands and programs, you must define the commands and programs to the system. You can also specify commands that users cannot issue from the background. Specifying authorized commands/programs, and commands not supported in the background describes how to specify these commands and programs using either SYS1.PARMLIB member IKJTSOxx or CSECTs IKJEFTE2, IKJEFTE8, IKJEFTAP, and IKJEFTNS.

The TSO/E service facility allows application programs to run unauthorized commands on a command invocation platform. In order for commands to run on the platform, you must define the eligible commands to the system. Specifying commands and programs for the command/program invocation platform describes how to specify the eligible commands using SYS1.PARMLIB member IKJTSOxx.

Before users can use the TRANSMIT and RECEIVE commands, you must set up the TRANSMIT and RECEIVE environment. Setting up the TRANSMIT and RECEIVE environment describes the tasks you must perform to make TRANSMIT and RECEIVE available to your users, including how to write the installation options CSECT, INMXPARM, or how to specify TRANSMIT and RECEIVE defaults using SYS1.PARMLIB member IKJTSOxx.

Customizing the HELP data set discusses the HELP data set and how you can customize it to include installation-specific information. The prompt mode HELP function lets users obtain additional on-line HELP information about a command's positional operands. By default, TSO/E provides this function for several TSO/E commands. You can update members in the HELP data set to provide the prompt mode HELP function for other TSO/E commands and for subcommands with positional operands. In addition you can use the include control character to include help information contained in a separate member.

The enhanced connectivity facility allows PC users to access host services. To use the enhanced connectivity facility, you must perform initialization tasks related to the input parameter data set, diagnostic data sets, and servers and initialization/termination programs. Making host services available to PC users describes how to set up and customize the enhanced facility.

You can use other facilities, such as System Management Facilities (SMF) and RMF™, to monitor the way users issue TSO/E commands and monitor the performance of TSO/E users. Monitoring TSO/E resources gives you the statistics that help you analyze and improve performance of on-line users and batch transactions. Monitoring TSO/E resources discusses ways to monitor performance.

After you have monitored your TSO/E resources, you can decide what kinds of response time to give TSO/E users in general, and whether certain individuals and special groups should have better response time. Information about performance objectives is described in Defining performance objectives for TSO/E.

You can limit users from issuing certain commands and accessing certain data sets. Protecting the resources TSO/E users can access provides an overview of the commands you can restrict from TSO/E READY mode, Session Manager, background mode, and ISPF/PDF panels. It also describe how to control the access TSO/E users have to certain data sets by using the MVS™ allocation input validation routine or RACF.

TSO/E provides support for displaying TSO/E information to users in different languages. The CONSOLE command also supports the displaying of translated system messages issued during a console session. Customizing TSO/E for different languages describes what you must do to provide information to users in their national language.

With RACF installed, you can use security enhancements. Security considerations for customizing TSO/E gives a brief description of the security considerations for customizing TSO/E and gives references to additional information.