Search results

Jump to navigation Jump to search

Google site results

Loading...

Wiki results

  • ...Interface on the Model 204 user, system manager, and CA-ACF2 installation security officer. This topic also provides requirements and a conversion checklist f ...owner of the data or by a security officer. CA-ACF2 MVS differs from other security systems that force you to define what is to be protected, rather than what ...
    61 KB (10,063 words) - 20:15, 27 April 2018
  • Server. See [[Horizon network management#Defining the network to SNA Communications Server|Defining the network to S ...arm|Set up the security module]], including assembling the <i>xxxx</i>PARM security module (such as RACFPARM). The object file is then stored in your local obj ...
    42 KB (6,954 words) - 20:17, 20 December 2021
  • ...define system defaults and file-specific overrides for those defaults, for security, procedure stamping, Administration ID assignment, and other "profile" opti <tr><th>4. Security</th> ...
    31 KB (5,224 words) - 23:26, 21 June 2017
  • <td>Only if installing [[Janus Network Security|Janus SSL]] or RKWeb.</td></tr> ...d SUBSYSMGMT privileges authorized via the [[Dictionary/204 administration#Security administration|DICTADMIN facility]] of Dictionary/204. The ID of the user t ...
    38 KB (6,234 words) - 17:03, 9 October 2017
  • ...u should have made decisions about the organization, recovery options, and security for the file you are creating. See [[File design]] for more information.</l ...ile security with FILEMGMT|Defining the file security]] (File Definition - Security screen).</li> ...
    23 KB (3,817 words) - 20:29, 26 September 2016
  • ...the file for your environment with settings for organization, recovery and security.</li> <li>What level of security does this file need?</li> ...
    34 KB (5,802 words) - 15:01, 6 February 2019
  • ...ction with [[:Category:Dictionary/204|Dictionary/204]] and the [[Subsystem Management facility]] (SUBSYSMGMT). It contains the procedure names, file names, and p The CCASYS file must be open to use the Subsystem Management facility and to run any user-written subsystem.</p> ...
    122 KB (20,007 words) - 19:46, 10 June 2020
  • ...those that were selected by the DBA on the Dictionary Administration File Management Facility screen. </p> <p>Resets file organization and security parameters.</p></td> ...
    21 KB (3,532 words) - 00:08, 2 April 2015
  • Security, for all computer systems, is the attempt to limit Generally, security can be broken down into four components: ...
    56 KB (9,545 words) - 22:30, 30 August 2016
  • ...partners' common session characteristics include request unit size, access security, trusted logins, and support for LU 6.2 and the CNOS protocol. </p> ...d specifies the local link to which the remote node connects and the login security for the link.</td> ...
    18 KB (2,904 words) - 21:10, 30 September 2015
  • The Subsystem Management facility of Dictionary lets you define a collection of procedures to <var c <td>Security facilities </td> ...
    86 KB (13,645 words) - 22:16, 25 April 2022
  • ...ret Interface on the Model 204 user, system manager, and the CA-Top Secret security administrator. Installation requirements and a conversion task summary are ...trator for Model 204 requires having enough scope of control to administer security functions needed to operate the CA-Top Secret Interface. </p> ...
    67 KB (11,012 words) - 19:58, 26 June 2019
  • <li>CCASTAT, if security features are used</li> ...obs in other regions or partitions and share a single copy of the database management system software. Each user program:</p> ...
    26 KB (4,108 words) - 21:25, 19 June 2018
  • ...tion request must be IODEV 27. For more information, see [[Horizon network management]] and also [[Defining the user environment (CCAIN)#Horizon (IODEV=27)|Horiz ...and session limit and common session characteristics like message size and security.</p> ...
    25 KB (3,941 words) - 13:45, 12 February 2019
  • Model 204 security determines whether a particular type of user is authorized to issue a parti [[Category:System management]] ...
    14 KB (2,332 words) - 14:14, 21 February 2019
  • ...h><th style="border-top: 2px solid #aaa">No facility record found for File Management</th></tr> ...ommand execution options, but the dictionary cannot find a record for File Management.</td></tr> ...
    182 KB (30,906 words) - 22:44, 17 March 2017
  • ...mplexities of <var class="product">User Language</var> and file and system management. </th><td>1200 pages; only if you are installing Janus Network Security.</td></tr> ...
    37 KB (6,116 words) - 21:31, 23 October 2015
  • <td>required for security</td> ===Transaction management === ...
    53 KB (8,684 words) - 20:02, 3 April 2017
  • <p>User waiting for the security interface.</p> <tr><td><p>ESM</p></td><td><p>userid validated by an External Security Manager - ACF2, RACF, or TopSecret</p></td></tr> ...
    28 KB (4,516 words) - 04:30, 10 November 2021
  • [[Janus Network Security]] as well as the <var>[[Stringlist_class|StringList]]</var> methods <var>[[ ==System management enhancements== ...
    37 KB (5,669 words) - 21:22, 6 August 2018
View ( | ) (20 | 50 | 100 | 250 | 500)