version 2 release 4 z/os · switch trace.....125
Post on 26-May-2020
25 Views
Preview:
TRANSCRIPT
-
z/OSVersion 2 Release 4
SDSF Operation and Customization
IBM
SA23-2274-40
-
Note
Before using this information and the product it supports, read the information in “Notices” on page607.
This edition applies to Version 2 Release 4 of z/OS (5650-ZOS) and to all subsequent releases and modifications untilotherwise indicated in new editions.
Last updated: 2020-04-27© Copyright International Business Machines Corporation 1997, 2020.US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract withIBM Corp.© Rocket Software, Inc. 2017, 2020.
-
Contents
Figures................................................................................................................ xv
Tables............................................................................................................... xvii
About this document........................................................................................ xxvii
z/OS information...............................................................................................xxix
How to send your comments to IBM................................................................... xxxiIf you have a technical problem.............................................................................................................. xxxi
Summary of changes....................................................................................... xxxiiiSummary of changes, Version 2 Release 4 (V2R4) as updated April 2020......................................... xxxiii
Chapter 1. Exploiting new functions.......................................................................1z/OS V2R4 summary as updated September, 2019................................................................................... 1
Exploiting the Enqueue panel (ENQD)................................................................................................... 1Exploiting the Extended Console panel (EMCS).................................................................................... 2Exploiting the JES Checkpoint panel (CKPT)......................................................................................... 2Exploiting the JES Subsystem panel (JES)............................................................................................ 2Exploiting the Job Class Members panel (JCM).................................................................................... 3Exploiting the Job DDName panel (JDDN).............................................................................................3Exploiting the JESInfo panel (JRI)......................................................................................................... 3Exploiting the JESInfo by Job panel (JRJ).............................................................................................4Exploiting the Job Memory Objects panel (JMO).................................................................................. 4Exploiting the Link Pack Directory panel (LPD)......................................................................................4Exploiting the OMVS Options panel (BPXO)...........................................................................................5Exploiting the Resource Monitor Alerts panel (RMA)............................................................................ 5Exploiting the WLM Policy panel (WLM).................................................................................................6Exploiting the WLM Report Class panel (REPC).....................................................................................6Exploiting the WLM Resource Groups panel (REPC)............................................................................. 6Exploiting the WLM Service Classes panel (SRVC)................................................................................ 7Exploiting the WLM Workloads panel (WKLD)....................................................................................... 7Exploiting the XCF Members and Groups panel (XCFM)....................................................................... 7
Chapter 2. Using ISFPARMS for customization and security.................................... 9ISFPARMS overview.....................................................................................................................................9
ISFPARMS format alternatives...............................................................................................................9Converting ISFPARMS assembler macros to statements.........................................................................10Reverting to the ISFPARMS defined with assembler macros...................................................................11
NOPARM fallback................................................................................................................................. 11Samples......................................................................................................................................................11Auditing ISFPARMS....................................................................................................................................12Diagnosing security....................................................................................................................................12Rules for coding ISFPARMS.......................................................................................................................13
Statements........................................................................................................................................... 13Assembler macros................................................................................................................................14
Conditional processing.............................................................................................................................. 14WHEN Statement..................................................................................................................................14
iii
-
System symbols................................................................................................................................... 16Global initialization parameters (OPTIONS or ISFPMAC).........................................................................16
Example of the OPTIONS statement and ISFPMAC macro................................................................ 17OPTIONS or ISFPMAC reference......................................................................................................... 17
Server connection (CONNECT).................................................................................................................. 21Example of the CONNECT statement.................................................................................................. 22CONNECT statement............................................................................................................................22
Group authorization parameters (GROUP or ISFGRP)..............................................................................23Group membership.............................................................................................................................. 23Group function......................................................................................................................................24Examples of the GROUP statement and ISFGRP macro..................................................................... 24Group membership parameters reference..........................................................................................25Group function parameters reference................................................................................................. 27Action characters and overtypeable fields for each command level..................................................61
Variable field lists (FLD or ISFFLD)............................................................................................................77Example of the FLD statement and ISFFLD macro............................................................................. 77FLD and ISFFLD syntax........................................................................................................................ 78
Name tables (NTBL or ISFNTBL)............................................................................................................... 85Examples of the NTBL statement and ISFNTBL macro...................................................................... 85NTBL and ISFNTBL syntax................................................................................................................... 86Usage notes.......................................................................................................................................... 86
Customized properties (PROPLIST).......................................................................................................... 87Example of the PROPLIST and associated statements...................................................................... 87PROPLIST syntax..................................................................................................................................87
Code page (TRTAB/TRDEF or ISFTR)......................................................................................................100Examples of the TRTAB statement and ISFTR macro...................................................................... 100TRTAB and ISFTR syntax................................................................................................................... 101Coding a translate table..................................................................................................................... 104
Chapter 3. Using the SDSF server....................................................................... 107Defining the input.................................................................................................................................... 107Starting the server................................................................................................................................... 108Starting the SDSFAUX server...................................................................................................................108Processing the statements......................................................................................................................108Accessing the server................................................................................................................................108Logging.....................................................................................................................................................109Security.................................................................................................................................................... 109Using the server for sysplex data............................................................................................................ 109
Device panels..................................................................................................................................... 109Sysplex-wide panels.......................................................................................................................... 109
Server operator commands.....................................................................................................................110Start the SDSF server......................................................................................................................... 110Start Aux.............................................................................................................................................114Change server options....................................................................................................................... 114Display server options........................................................................................................................117Display Exit.........................................................................................................................................118Display JES......................................................................................................................................... 118Display Task....................................................................................................................................... 119Display User....................................................................................................................................... 120Display information about server communications.......................................................................... 120Refresh ISFPARMS.............................................................................................................................121Set Trace.............................................................................................................................................122Start communications........................................................................................................................122Stop communications........................................................................................................................ 123Stop the SDSF server......................................................................................................................... 123Stop Aux............................................................................................................................................. 124Switch Log.......................................................................................................................................... 124
iv
-
Switch Trace.......................................................................................................................................125
Chapter 4. Columns on the SDSF panels............................................................. 127Address Space Memory panel (AS).........................................................................................................127Authorized Program Facility panel (APF)................................................................................................ 129CF Connection panel (CFC)......................................................................................................................130CF Structure panel (CFS)......................................................................................................................... 131Common Storage Remaining panel (CSR) ..............................................................................................133Device Activity panel (DEV) .................................................................................................................... 134Display Active Users panel (DA)..............................................................................................................135Dynamic Exits panel (DYNX)....................................................................................................................138Enclaves panel (ENC)...............................................................................................................................139Enqueue panel (ENQ).............................................................................................................................. 141Extended Console panel (EMCS) ............................................................................................................ 142File Systems panel (FS) .......................................................................................................................... 144Generic Tracker panel (GT) .................................................................................................................... 145Health Check History panel (CKH).......................................................................................................... 146Health Checker panel (CK)...................................................................................................................... 146Held Output panel (H)..............................................................................................................................148Initiator panel (INIT)............................................................................................................................... 152Input Queue panel (I).............................................................................................................................. 153JES Checkpoint panel (CKPT)..................................................................................................................157JESInfo panel (JRI)..................................................................................................................................158JESInfo by Job panel (JRJ)..................................................................................................................... 159JES Subsystem panel (JES).....................................................................................................................160JESPLEX panel (JP)..................................................................................................................................161Job Class Members panel (JCM)............................................................................................................. 161Job Class panel (JC)................................................................................................................................ 162Job Data Set panel (JDS).........................................................................................................................164Job Delay panel (JY)................................................................................................................................ 168Job Dependency panel (JP).....................................................................................................................169Job Device panel (JD)..............................................................................................................................170Job DDName panel (JDDN)..................................................................................................................... 172Job Group panel (JG)...............................................................................................................................173Job Memory panel (JM)........................................................................................................................... 174Job Memory Objects panel (JMO)...........................................................................................................175Job Module panel (JC) ............................................................................................................................ 176Job Step panel (JS)..................................................................................................................................177Job Tasks panel (JT) ...............................................................................................................................179Job 0 (J0)................................................................................................................................................. 180Lines panel (LI)........................................................................................................................................ 181Link List panel (LNK)................................................................................................................................ 183Link Pack Area panel (LPA)......................................................................................................................184Link Pack Directory panel (LPD).............................................................................................................. 185Multi-Access Spool panel (MAS) and JESPLEX (JP) panel..................................................................... 186Network Activity panel (NA) ................................................................................................................... 188Network Connections (NC) ..................................................................................................................... 189Network Servers (NS).............................................................................................................................. 191Nodes panel (NO).................................................................................................................................... 192OMVS options panel (BPXO)....................................................................................................................194Output Descriptors panel (OD)................................................................................................................195Output Queue panel (O).......................................................................................................................... 197Page panel (PAG)..................................................................................................................................... 200PARMLIB panel (PARM)........................................................................................................................... 201Printer panel (PR).................................................................................................................................... 202Proclib panel (PROC)............................................................................................................................... 207Processes panel (PS)............................................................................................................................... 208
v
-
Punch panel (PUN)...................................................................................................................................209Reader panel (RDR)................................................................................................................................. 212Resource panel (RES).............................................................................................................................. 214Resource Monitor panel (RM)..................................................................................................................214Resource Monitor Alerts panel (RMA).....................................................................................................215Scheduling Environment panel (SE)........................................................................................................216Spool Offload panel (SO)......................................................................................................................... 216Spool Volumes panel (SP)....................................................................................................................... 219Search panel (SRCH)............................................................................................................................... 221SMS Groups panel (SMSG) ..................................................................................................................... 222SMS Volumes panel (SMSV) ................................................................................................................... 223Status panel (ST)..................................................................................................................................... 224Subsystem panel (SSI)............................................................................................................................ 228System Symbols panel (SYM)..................................................................................................................229System panel (SYS)................................................................................................................................. 230System Requests panel (SR)................................................................................................................... 232Virtual Storage Map panel (VMAP) ......................................................................................................... 233WLM Policy panel (WLM)......................................................................................................................... 234WLM Report Class panel (REPC)............................................................................................................. 234WLM Resource Group panel (RGRP)....................................................................................................... 235WLM Service Classes panel (SRVC).........................................................................................................236WLM Workload panel (WKLD)................................................................................................................. 237XCF Members and Groups panel (XCFM)................................................................................................238
Chapter 5. Using SAF for security....................................................................... 241Relationship of SAF and ISFPARMS........................................................................................................ 241
Using ISFPARMS as a backup to SAF................................................................................................ 241Changing authorization dynamically....................................................................................................... 242Auditing access attempts........................................................................................................................242Diagnosing security................................................................................................................................. 242SAF concepts for SDSF resources...........................................................................................................243
Protecting SDSF function................................................................................................................... 243
Chapter 6. SDSF and RACF.................................................................................257Security administration........................................................................................................................... 257Brief summary of RACF commands........................................................................................................ 257Delegation of RACF administrative authority..........................................................................................258
SDSF resource group class................................................................................................................ 258Establishing SAF security with RACF...................................................................................................... 259
RACF authorization checking and ISFPARMS security..................................................................... 259Considerations for broad access....................................................................................................... 259
Using RACLIST and REFRESH................................................................................................................. 259Using RACLIST and REFRESH with the SDSF class...........................................................................260Using RACLIST and REFRESH with the OPERCMDS class................................................................ 260
Using conditional access......................................................................................................................... 260Sample RACF commands........................................................................................................................ 261Multilevel Security................................................................................................................................... 261
Chapter 7. Protecting SDSF functions.................................................................263Action characters.....................................................................................................................................263
Protecting the objects of action characters...................................................................................... 263Protecting the generated MVS and JES commands..........................................................................264Protecting action characters as separate resources ........................................................................265Setting up generic profiles................................................................................................................. 265Examples of protecting action characters.........................................................................................266Tables of action characters................................................................................................................266
Authorized program facility data sets..................................................................................................... 296
vi
-
Protecting authorized program facility data sets.............................................................................. 296Example of protecting authorized program facility data sets...........................................................297
Authorized SDSF commands...................................................................................................................297Protecting SDSF commands.............................................................................................................. 297Setting up generic profiles................................................................................................................. 300Examples of protecting commands...................................................................................................300
CF connections........................................................................................................................................ 301Protecting CF connections................................................................................................................. 301Example of CF connections............................................................................................................... 301
CF structures............................................................................................................................................301Protecting CF structures.................................................................................................................... 301Example of CF structures...................................................................................................................302
Checks on the CK and CKH panels..........................................................................................................302Protecting checks...............................................................................................................................302Example of protecting checks........................................................................................................... 302
Destination names...................................................................................................................................303Protecting destination names............................................................................................................303Initializing destinations......................................................................................................................303Example of protecting destination names........................................................................................ 304
Destination operator authority................................................................................................................304Protecting operator authority by destination.................................................................................... 304
Device activity information......................................................................................................................305Protecting device activity...................................................................................................................305Example of protecting device information........................................................................................ 306
Dynamic exit information........................................................................................................................ 306Protecting dynamic exits....................................................................................................................306Example of protecting dynamic exits................................................................................................ 307
EMCS consoles information.....................................................................................................................307Protecting EMCS consoles................................................................................................................. 307Example of protecting EMCS consoles..............................................................................................307
Enclaves................................................................................................................................................... 307Protecting enclaves............................................................................................................................307Example of protecting enclaves........................................................................................................ 308
Enqueue information............................................................................................................................... 308Protecting Enqueue Information....................................................................................................... 308Example of protecting enqueue information.....................................................................................308
File system information...........................................................................................................................308Protecting file systems.......................................................................................................................308Example of protecting file systems................................................................................................... 308
Generic tracker events............................................................................................................................ 309Protecting generic tracker events......................................................................................................309Example of protecting generic tracker events.................................................................................. 309
Initiators.................................................................................................................................................. 309Protecting initiators............................................................................................................................309Example of protecting initiators........................................................................................................ 310
JES2 resources on the RM panel.............................................................................................................310Protecting JES2 resources.................................................................................................................310Example of protecting JES2 resources............................................................................................. 311
JES subsystems.......................................................................................................................................311Protecting JES subsystems............................................................................................................... 311Example of protecting JES subsystems............................................................................................ 311
Job classes.............................................................................................................................................. 312Protecting job classes........................................................................................................................ 312Example of protecting job classes.....................................................................................................312
Job class members..................................................................................................................................312Protecting job class members........................................................................................................... 312Example of protecting job class members........................................................................................ 312
Job devices.............................................................................................................................................. 312
vii
-
Protecting job devices........................................................................................................................313Example of protecting job devices.................................................................................................... 313
Jobs, job groups, output groups, and SYSIN/SYSOUT data sets........................................................... 313Protecting jobs, job groups, output groups, and SYSIN/SYSOUT data sets.....................................313Permitting other users to view your data.......................................................................................... 316Providing function comparable to NOTIFY authority........................................................................316Examples of protecting jobs and output groups............................................................................... 316
JESInfo resources................................................................................................................................... 318Protecting JESInfo resources............................................................................................................ 318Example of protecting JESInfo resources.........................................................................................318
JESInfo by job resources.........................................................................................................................318Protecting JESInfo by job resources................................................................................................. 318Example of protecting JESInfo by job resources.............................................................................. 319
Lines......................................................................................................................................................... 319Protecting lines.................................................................................................................................. 319Example of protecting lines............................................................................................................... 319
Link list data sets..................................................................................................................................... 320Protecting link list data sets.............................................................................................................. 320Example of protecting link list data sets........................................................................................... 320
MAS and JESPLEX members................................................................................................................... 320Protecting MAS and JESPLEX members............................................................................................320Example of protecting MAS members...............................................................................................321
Membership in groups.............................................................................................................................321Controlling membership in groups.................................................................................................... 321Example of protecting membership in a group in ISFPARMS...........................................................321
MVS and JES commands on the command line......................................................................................321Protecting the slash command.......................................................................................................... 321Slash command and User Log........................................................................................................... 322Example of protecting the slash command.......................................................................................322
Network activity.......................................................................................................................................322Protecting network activity................................................................................................................ 322Example of protecting network activity.............................................................................................323
Network connections...............................................................................................................................323Protecting network connections........................................................................................................323Example of protecting network connections.................................................................................... 323
Network servers.......................................................................................................................................324Protecting network servers................................................................................................................324Example of protecting network servers............................................................................................ 324
Nodes....................................................................................................................................................... 324Protecting nodes................................................................................................................................ 324Example of protecting nodes.............................................................................................................325
OMVS options...........................................................................................................................................325Protecting OMVS options................................................................................................................... 325Example of protecting OMVS options................................................................................................325
OPERLOG................................................................................................................................................. 325Protecting the log stream.................................................................................................................. 326
Overtypeable fields..................................................................................................................................326Protecting the overtypeable field...................................................................................................... 326Protecting the objects of overtypeable fields................................................................................... 326Protecting the generated MVS and JES commands..........................................................................327Generic profiles.................................................................................................................................. 327Examples of protecting overtypeable fields......................................................................................328Tables of overtypeable fields.............................................................................................................329
Page data sets..........................................................................................................................................368Protecting page data sets.................................................................................................................. 368Example of protecting page data sets............................................................................................... 368
PARMLIB data sets.................................................................................................................................. 369Protecting PARM data sets.................................................................................................................369
viii
-
Example of protecting PARM data sets............................................................................................. 369Printers.....................................................................................................................................................369
Protecting printers............................................................................................................................. 369Permitting access only while using SDSF..........................................................................................370Examples of protecting printers........................................................................................................ 370
Processes (z/OS UNIX System Services)................................................................................................ 370Protecting processes......................................................................................................................... 370Example of protecting processes...................................................................................................... 371
Proclibs.................................................................................................................................................... 371Protecting proclibs............................................................................................................................. 371Example of protecting proclibs..........................................................................................................371
Punches................................................................................................................................................... 371Protecting punches............................................................................................................................ 371Permitting access only while using SDSF..........................................................................................372Example of protecting punches......................................................................................................... 372
Readers.................................................................................................................................................... 372Protecting readers..............................................................................................................................372Example of protecting readers.......................................................................................................... 373
Resource monitor alerts.......................................................................................................................... 373Protecting resource monitor alerts....................................................................................................373Example of protecting resource monitor alerts................................................................................ 373
Resources defined to WLM......................................................................................................................373Protecting WLM resources................................................................................................................. 373Example of protecting resources.......................................................................................................374
Scheduling environments........................................................................................................................374Protecting scheduling environments.................................................................................................374Example of protecting scheduling environments............................................................................. 374
SDSF server..............................................................................................................................................374Protecting the SDSF server................................................................................................................ 375Examples of protecting the SDSF server........................................................................................... 375
SMS storage groups.................................................................................................................................375Protecting SMS storage groups......................................................................................................... 375Example of protecting SMS storage groups...................................................................................... 376
SMS volumes............................................................................................................................................376Protecting SMS volumes.................................................................................................................... 376Example of protecting SMS volumes.................................................................................................377
Spool offloaders.......................................................................................................................................377Protecting spool offloaders................................................................................................................377Example of protecting spool offloaders............................................................................................ 377
Spool volumes......................................................................................................................................... 377Protecting spool volumes.................................................................................................................. 377Example of protecting spool volumes............................................................................................... 378
Subsystems..............................................................................................................................................378Protecting subsystems.......................................................................................................................378Example of protecting subsystems................................................................................................... 379
SYSLOG.................................................................................................................................................... 379Protecting the logical log................................................................................................................... 379
System Symbol information.................................................................................................................... 379Protecting system symbol information............................................................................................. 379Example of protecting system symbol information.......................................................................... 379
System information................................................................................................................................. 380Protecting system information.......................................................................................................... 380Example of protecting system information....................................................................................... 381
System requests...................................................................................................................................... 381Protecting system requests............................................................................................................... 381Example of protecting system requests............................................................................................381
User log (ULOG)....................................................................................................................................... 382Protecting the ULOG.......................................................................................................................... 382
ix
-
Examples of protecting ULOG............................................................................................................382XCF groups and members....................................................................................................................... 382
Protecting XCF groups and members................................................................................................382Example of protecting XCF groups and members.............................................................................383
Chapter 8. Converting ISFPARMS to SAF security............................................... 385Getting started.........................................................................................................................................385SDSF environment................................................................................................................................... 385Migration considerations......................................................................................................................... 385Examples of RACF security for SDSF groups.......................................................................................... 386
Providing group authority...................................................................................................................386Group 1 — system programmers....................................................................................................... 387Group 2 — operators.......................................................................................................................... 389Group 3 — end users.......................................................................................................................... 393Summary of profiles for group 1, group 2, and group 3....................................................................396Using the Security Conversion Assist................................................................................................ 399
Diagnosing security................................................................................................................................. 404
Chapter 9. Using installation exit routines.......................................................... 405Installation exit routines......................................................................................................................... 405
Using the ISFUSER module................................................................................................................405Installation exit points.............................................................................................................................406
SAF considerations for exit points.....................................................................................................406Initialization exit point....................................................................................................................... 406Command authority exit point........................................................................................................... 410SYSOUT display authority exit point..................................................................................................411SDSF termination exit point............................................................................................................... 411Pre-SAF exit point.............................................................................................................................. 412Post-SAF exit point............................................................................................................................ 412SAF indeterminate exit point............................................................................................................. 413Table build exit point......................................................................................................................... 414
Chapter 10. Installation and configuration considerations.................................. 415JES3 considerations................................................................................................................................ 415
Getting started running SDSF in the JES3 environment................................................................... 415JES2 considerations................................................................................................................................ 417
DESTDEF considerations................................................................................................................... 417SDSF with a secondary JES2 subsystem...........................................................................................417
SDSF considerations................................................................................................................................417Issuing MVS and JES commands............................................................................................................ 417
Console for issuing MVS and JES commands....................................................................................417Storing MVS and JES commands.......................................................................................................418
RMF considerations................................................................................................................................. 419ISPF considerations.................................................................................................................................420
Scrollable main menu and fallback................................................................................................... 421ISFISP entry point..............................................................................................................................421Specifying that SDSF should process JES2.......................................................................................422
z/OSMF considerations............................................................................................................................422Using the SDSF classic interface....................................................................................................... 435
Chapter 11. Introduction to SDSF application services........................................437
Chapter 12. SDSF messages and codes.............................................................. 439Displaying message help.........................................................................................................................439User authorization................................................................................................................................... 439SDSF messages....................................................................................................................................... 439Messages with HSF message numbers...................................................................................................484
x
-
Messages with ISF message numbers....................................................................................................490Messages for IBM Health Checker for z/OS............................................................................................549SDSF user abend codes...........................................................................................................................556
Appendix A. SDSF problem management........................................................... 561Observing and identifying a problem...................................................................................................... 561Gathering information about a problem................................................................................................. 561
Dumps................................................................................................................................................ 561Trace...................................................................................................................................................561Module information............................................................................................................................561
SDSF problem index................................................................................................................................ 562Problems with the Repeat-Find PF keys (PF5 and PF17).................................................................562Problems with the LOG, RETRIEVE and TUTOR commands.............................................................562Users are experiencing authorization problems............................................................................... 562SDSF has abended............................................................................................................................. 563Documentation is incorrect................................................................................................................563An SDSF message is incorrect........................................................................................................... 563A message was not found in the tutorial........................................................................................... 563Data on an SDSF panel is garbled or incorrect..................................................................................563RMF exit is not installed.....................................................................................................................564
Appendix B. SAF equivalents for ISFPARMS....................................................... 565ACTION.................................................................................................................................................... 565ACTIONBAR............................................................................................................................................. 565APPC.........................................................................................................................................................565AUPDT...................................................................................................................................................... 565AUTH=ABEND..........................................................................................................................................565AUTH=ACTION........................................................................................................................................ 565AUTH=ALL................................................................................................................................................565AUTH=ALLOPER.......................................................................................................................................566AUTH=ALLUSER.......................................................................................................................................566AUTH=APF............................................................................................................................................... 566AUTH=AS................................................................................................................................................. 566AUTH=CFC............................................................................................................................................... 566AUTH=CFS............................................................................................................................................... 566AUTH=CK................................................................................................................................................. 567AUTH=CSR............................................................................................................................................... 567AUTH=DA................................................................................................................................................. 567AUTH=DEST............................................................................................................................................. 567AUTH=DEV............................................................................................................................................... 567AUTH=DYNX............................................................................................................................................ 568AUTH=EMCS............................................................................................................................................ 568AUTH=ENC...............................................................................................................................................568AUTH=ENQ...............................................................................................................................................568AUTH=FINDLIM....................................................................................................................................... 568AUTH=FS..................................................................................................................................................568AUTH=GT................................................................................................................................................. 568AUTH=H................................................................................................................................................... 569AUTH=I.................................................................................................................................................... 569AUTH=INIT.............................................................................................................................................. 569AUTH=INPUT........................................................................................................................................... 569AUTH=JC..................................................................................................................................................569AUTH=JES................................................................................................................................................569AUTH=JRI................................................................................................................................................ 569AUTH=JRJ................................................................................................................................................570AUTH=JG................................................................................................................................................. 570AUTH=J0..................................................................................................................................................570
xi
-
AUTH=LI...................................................................................................................................................570AUTH=LNK............................................................................................................................................... 570AUTH=LOG...............................................................................................................................................570AUTH=LPA................................................................................................................................................570AUTH=LPD............................................................................................................................................... 571AUTH=MAS.............................................................................................................................................. 571AUTH=NA.................................................................................................................................................571AUTH=NC................................................................................................................................................. 571AUTH=NO.................................................................................................................................................571AUTH=NS................................................................................................................................................. 571AUTH=O................................................................................................................................................... 571AUTH=OMVS............................................................................................................................................ 572AUTH=PAG...............................................................................................................................................572AUTH=PARM............................................................................................................................................ 572AUTH=PR................................................................................................................................................. 572AUTH=PREF............................................................................................................................................. 572AUTH=PROC............................................................................................................................................ 572AUTH=PS..................................................................................................................................................572AUTH=PUN...............................................................................................................................................573AUTH=RDR...............................................................................................................................................573AUTH=RES............................................................................................................................................... 573AUTH=REPC.............................................................................................................................................573AUTH=RGRP............................................................................................................................................ 573AUTH=RM.................................................................................................................................................573AUTH=RMA.............................................................................................................................................. 573AUTH=RSYS............................................................................................................................................. 574AUTH=SE..................................................................................................................................................574AUTH=SMSG............................................................................................................................................ 574AUTH=SMSV............................................................................................................................................ 574AUTH=SO................................................................................................................................................. 574AUTH=SP..................................................................................................................................................574AUTH=SR................................................................................................................................................. 574AUTH=SRVC.............................................................................................................................................575AUTH=SSI................................................................................................................................................ 575AUTH=ST..................................................................................................................................................575AUTH=SYS............................................................................................................................................... 575AUTH=SYSID........................................................................................................................................... 575AUTH=SYSNAME..................................................................................................................................... 575AUTH=TRACE...........................................................................................................................................575AUTH=ULOG............................................................................................................................................ 576AUTH=VMAP............................................................................................................................................ 576AUTH=WKLD............................................................................................................................................ 576AUTH=WLM..............................................................................................................................................576AUTH=XCFM............................................................................................................................................ 576BROWSE...................................................................................................................................................576CMDAUTH=DEST..................................................................................................................................... 576CMDAUTH=DISPLAY............................................................................................................................... 577CMDAUTH=GROUP..................................................................................................................................577CMDAUTH=INIT...................................................................................................................................... 577CMDAUTH=NOTIFY................................................................................................................................. 577CMDAUTH=MSG...................................................................................................................................... 577CMDAUTH=USERID................................................................................................................................. 578CMDAUTH=ALL........................................................................................................................................ 578CMDLEV....................................................................................................................................................579CONFIRM................................................................................................................................................. 579CPUFMT................................................................................................................................................... 579CTITLE......................................................................................................................................................579CURSOR................................................................................................................................................... 579
xii
-
DADFLT.................................................................................................................................................... 579DATE.........................................................................................................................................................579DATESEP.................................................................................................................................................. 580DEST.........................................................................................................................................................580DISPLAY................................................................................................................................................... 580DSPAUTH=ADEST.................................................................................................................................... 580DSPAUTH=ALL......................................................................................................................................... 580DSPAUTH=AMDEST................................................................................................................................. 581DSPAUTH=AMSG..................................................................................................................................... 581DSPAUTH=GROUP................................................................................................................................... 581DSPAUTH=GRPMSG................................................................................................................................ 582DSPAUTH=NOTIFY.................................................................................................................................. 582DSPAUTH=USERID.................................................................................................................................. 582EMCSAUTH...............................................................................................................................................582EMCSREQ................................................................................................................................................. 582GPLEN...................................................................................................................................................... 582GPREF...................................................................................................................................................... 582ICMD........................................................................................................................................................ 583IDEST....................................................................................................................................................... 583IDSP......................................................................................................................................................... 583IDSPD.......................................................................................................................................................583ILOGCOL.................................................................................................................................................. 583INPUT.......................................................................................................................................................584ISTATUS...................................................................................................................................................584ISYS..........................................................................................................................................................584LANG........................................................................................................................................................ 584LOG/LOGOPT........................................................................................................................................... 584OWNER.....................................................................................................................................................584PREFIX..................................................................................................................................................... 584RSYS.........................................................................................................................................................584SYSID....................................................................................................................................................... 584UPCTAB....................................................................................................................................................584VALTAB.................................................................................................................................................... 584VIO........................................................................................................................................................... 585XCMD........................................................................................................................................................585XDSP.........................................................................................................................................................585XDSPD...................................................................................................................................................... 585XSTATUS.................................................................................................................................................. 585
Appendix C. SDSF resource names for SAF security............................................ 587
Appendix D. Accessibility...................................................................................603Accessibility features.............................................................................................................................. 603Consult assistive technologies................................................................................................................603Keyboard navigation of the user interface..............................................................................................603Dotted decimal syntax diagrams.............................................................................................................603
Notices..............................................................................................................607Terms and conditions for product documentation.................................................................................608IBM Online Privacy Statement................................................................................................................ 609Policy for unsupported hardware............................................................................................................609Minimum supported hardware................................................................................................................610Programming interface information........................................................................................................610Trademarks..............................................................................................................................................610
Index................................................................................................................ 611
xiii
-
xiv
-
Figures
1. Start Aux Options — Syntax...................................................................................................................... 114
2. Change Server Options — Syntax..............................................................................................................115
3. Display Server Options — Syntax..............................................................................................................117
4. Display Exit Options — Syntax.................................................................................................................. 118
5. Display JES Options — Syntax.................................................................................................................. 118
6. Display Task Options — Syntax.................................................................................................................119
7. Display User Options — Syntax.................................................................................................................120
8. Display Information About Server Communications — Syntax................................................................120
9. Refresh ISFPARMS — Syntax.................................................................................................................... 121
10. Set Trace Options — Syntax....................................................................................................................122
11. Start Communications — Syntax............................................................................................................ 123
12. Stop Communications — Syntax.............................................................................................................123
13. STOP the SDSF Server — Syntax.............................................................................................................124
14. Stop Aux Options — Syntax.....................................................................................................................124
15. Switch Log Options — Syntax...............................................
top related