Accessing Files Programmer's Guide (32650-90885)

174 Chapter13
Maintaining File Security
Access Control Definition Security (ACD)
*The capabilities mask is read as follows:
User File access Program/group
bit capability bit capability bit capability
0 SM 6 CV 23 BA
1 AM 7 UV 24 IA
2 AL 8 LG 25 PM
3 GL 9 SP 28 MR
4 DI 10 PS 30 DS
5 OP 11 NA 31 PH
12 NM
13 CS
14 ND
15 SF
Logging a specific user
The LOGTOOL utility command LIST shows you the output of log records in a standard
format. If you like, you can filter the output of LOGTOOL utility to show you information
about only a specific user or users. The syntax for this is shown below.
LIST {LOG=
log_name
}[;JSNAME=
job or session_name
;USER=
user_name
;ACCOUNT=
account_name
][...]
The input for these commands should be no longer than 80 characters. Default for all
3 time stamp
2 job type/job number
25 file name
1 (reserved)
2 priority
2 process space id
4 parent PID
2 NM_Heap_Size
2 capabilities mask*
8 (reserved)
8 user name
8 group name
8 account name
8 job or session name
Table 13-7. Type 141 Record
length, in 16-bit words Record Content