Accessing Files Programmer's Guide (32650-90885)

Chapter 13 175
Maintaining File Security
Access Control Definition Security (ACD)
parameters is the wildcard @.
For example, to select log records from log files 1 through 5, with log information about
password changes (log type 134), and user identification JTEST,MARIA.PAYROLL, you
would enter the following.
>LIST LOG=1/5;TYPE=134;JSNAME=JTEST;USER=MARIA;ACCOUNT=PAYROLL
This selection option is valid for the log types listed below:
102, job initiation
103, job termination
104, process termination
105, file close (also 160)
108, spooling log
112, physical mount/dismount
113, logical mount/dismount
114, tape labels
115, console log
116, program file event
120, new commercial spooling
130, architecture interface
134, password change
135, system logging configuration
136, restore
137, printer access failure
138, ACD changes
139, stream initiation
140, user logging access
141, process initiation
143, change group
144, file open
Logging file security related events
MPE/iX permits logging of system and user events. The events that relate directly to file
security are:
password changes (event type 134)
printer access failure (event type 137)
ACD changes (event type 138)