Accessing Files Programmer's Guide (32650-90885)

Chapter 13 173
Maintaining File Security
Access Control Definition Security (ACD)
Log of user logging
This log keeps a record of all OPENLOG and CLOSELOG intrinsic calls. The system manager
can use it to see who accesses, or tries to access, the user logging facility.
This log is initially disabled, but can be enabled by SYSGEN followed by a START
command.
The LOG ID field in the log record is "XXXXXX" for CLOSELOG intrinsic when the index is
bad.
Log of process creation
You can use this log to record all process creations. This log is initially disabled, but can be
enabled by SYSGEN followed by a START command.
Table 13-6. Type 140 Record Format
Length, in 16-bit
words
Record Content
1 record type (140)
1 record length
1 process identification number
3 time stamp
2 job type/job number
25 program file name
4 intrinsic
2 index
4 log id
1 mode
1 status
8 user name
8 group name
8 account name
8 job or session name
Table 13-7. Type 141 Record
length, in 16-bit words Record Content
1 record type (141)
1 record length
1 process identification number