Accessing Files Programmer's Guide (32650-90885)

178 Chapter13
Maintaining File Security
Access Control Definition Security (ACD)
PIN
log information
the identification of the user who changed the ACD: job or session name, user name,
group name, and account name
the object type and object name whose ACD was changed
the object type and object name from which the ACD was copied
the type of change to the ACD: create, add pair, replace pair, copy, delete pair, delete
the program file name from which the ACD change was executed.
status returned (HPE status)
In this example, user JOHN.PAYROLL,DOE, with job or session name JREPORT,
successfully created an ACD for a file called FTEST.TESTGP.PAYROLL, using the
command executor.
The LOGTOOL formats the following layout after the standard header:
TARGET OBJECT: FTEST.TESTGP.PAYROLL
SOURCE OBJECT:
FUNCTION: CREATE
EXECUTED FROM: CI.PUB.SYS
STATUS SUCCESSFUL
USER JOHN GROUP: DOE
ACCOUNT: PAYROLL JSNAME: JREPORT
The following is the log record format:
Table 13-9. Type 138 Record Format
length, in 16-bit
words
Record Content
1 Record type (138)
1 Record length
1 Process identification number
3 Time stamp
2 Job type/job number
25 Target object name
25 Source object name
4 Function
25 Executed from
2 Status
8 User name
8 Group name