Search results

Jump to navigation Jump to search

Google site results

Loading...

Wiki results

  • Data Type NON-PREALLOCATED Average Length Security .... OCCURS</b> input fields are hidden. These are examples of dynamic screen management, described more fully in [[#Field attribute dependency rules|Field attribut ...
    21 KB (3,449 words) - 04:20, 10 May 2014
  • <td>At runtime, according to the delete option selected. See [[MQ/204 queue management#Using runtime options|Using runtime options]].</td> ...OSE QUEUE statement is issued to delete a permanent local dynamic queue, a security check is made to ensure that the user identifier is authorized to delete th ...
    47 KB (8,022 words) - 20:01, 21 May 2018
  • ...cific to Parallel Query Option/204. Basic knowledge of Model 204 subsystem management is assumed.</p> ...node (with possible maximum values specified for file privileges and field security). </p> ...
    36 KB (5,981 words) - 01:13, 8 August 2018
  • ...4 operations from your smartphone or other mobile device.</p> All existing security and product ownership is honored in the RKWEB subsystem &mdash; for instanc <li>Configure change management for procedures ([[#Configure|Configure]])</li> ...
    73 KB (12,190 words) - 19:30, 25 September 2017
  • ...the file manager in maintaining <var class="product">Model&nbsp;204</var> security. </p> ===Additional documentation on security features=== ...
    67 KB (11,140 words) - 19:20, 17 November 2023
  • ...tion in an encrypted format. All <var class="product">Model&nbsp;204</var> security features depend upon the existence of CCASTAT.</p> ...t security and modification of CCASTAT, see [[Establishing and maintaining security]]. </p> ...
    38 KB (6,272 words) - 04:08, 12 March 2019
  • ...administrator in the ADMIN class for each subsystem by using the Subsystem Management facility. </p> ...ms#Overview of the Subsystem Management facility|Overview of the Subsystem Management facility]]. </p> ...
    80 KB (13,064 words) - 22:46, 22 June 2017
  • ...erver Interface on the Model 204 user, system manager, and Security Server security administrator. <p class="note"><b>Note:</b> The Security Server interface was formerly known as the RACF interface.</p> ...
    59 KB (9,593 words) - 01:37, 21 August 2019
  • ...ely parallel to those of Horizon, which are described in [[Horizon network management]]. This section presents the PQO DEFINE command syntax and describes the pa ...for PQO is 2K). For more information about RUSIZES, see [[Horizon network management]].</li> ...
    45 KB (7,045 words) - 16:53, 8 August 2018
  • ...ow it affects the Model 204 user, system manager, and CA-ACF2 installation security officer.</p> ...lowed by the resource owner or a security officer. This differs from other security systems that force you to define what is to be protected, rather than what ...
    74 KB (12,163 words) - 23:48, 19 April 2018
  • ...Interface on the Model 204 user, system manager, and CA-ACF2 installation security officer. This topic also provides requirements and a conversion checklist f ...owner of the data or by a security officer. CA-ACF2 MVS differs from other security systems that force you to define what is to be protected, rather than what ...
    61 KB (10,063 words) - 20:15, 27 April 2018
  • Server. See [[Horizon network management#Defining the network to SNA Communications Server|Defining the network to S ...arm|Set up the security module]], including assembling the <i>xxxx</i>PARM security module (such as RACFPARM). The object file is then stored in your local obj ...
    42 KB (6,954 words) - 20:17, 20 December 2021
  • ...define system defaults and file-specific overrides for those defaults, for security, procedure stamping, Administration ID assignment, and other "profile" opti <tr><th>4. Security</th> ...
    31 KB (5,224 words) - 23:26, 21 June 2017
  • <td>Only if installing [[Janus Network Security|Janus SSL]] or RKWeb.</td></tr> ...d SUBSYSMGMT privileges authorized via the [[Dictionary/204 administration#Security administration|DICTADMIN facility]] of Dictionary/204. The ID of the user t ...
    38 KB (6,234 words) - 17:03, 9 October 2017
  • ...u should have made decisions about the organization, recovery options, and security for the file you are creating. See [[File design]] for more information.</l ...ile security with FILEMGMT|Defining the file security]] (File Definition - Security screen).</li> ...
    23 KB (3,817 words) - 20:29, 26 September 2016
  • ...the file for your environment with settings for organization, recovery and security.</li> <li>What level of security does this file need?</li> ...
    34 KB (5,802 words) - 15:01, 6 February 2019
  • ...ction with [[:Category:Dictionary/204|Dictionary/204]] and the [[Subsystem Management facility]] (SUBSYSMGMT). It contains the procedure names, file names, and p The CCASYS file must be open to use the Subsystem Management facility and to run any user-written subsystem.</p> ...
    122 KB (20,007 words) - 19:46, 10 June 2020
  • ...those that were selected by the DBA on the Dictionary Administration File Management Facility screen. </p> <p>Resets file organization and security parameters.</p></td> ...
    21 KB (3,532 words) - 00:08, 2 April 2015
  • Security, for all computer systems, is the attempt to limit Generally, security can be broken down into four components: ...
    56 KB (9,545 words) - 22:30, 30 August 2016
  • ...partners' common session characteristics include request unit size, access security, trusted logins, and support for LU 6.2 and the CNOS protocol. </p> ...d specifies the local link to which the remote node connects and the login security for the link.</td> ...
    18 KB (2,904 words) - 21:10, 30 September 2015
View ( | ) (20 | 50 | 100 | 250 | 500)