Accessing Files Programmer's Guide (32650-90885)
178 Chapter13
Maintaining File Security
Access Control Definition Security (ACD)
— PIN
• log information
— the identification of the user who changed the ACD: job or session name, user name,
group name, and account name
— the object type and object name whose ACD was changed
— the object type and object name from which the ACD was copied
— the type of change to the ACD: create, add pair, replace pair, copy, delete pair, delete
— the program file name from which the ACD change was executed.
— status returned (HPE status)
In this example, user JOHN.PAYROLL,DOE, with job or session name JREPORT,
successfully created an ACD for a file called FTEST.TESTGP.PAYROLL, using the
command executor.
The LOGTOOL formats the following layout after the standard header:
TARGET OBJECT: FTEST.TESTGP.PAYROLL
SOURCE OBJECT:
FUNCTION: CREATE
EXECUTED FROM: CI.PUB.SYS
STATUS SUCCESSFUL
USER JOHN GROUP: DOE
ACCOUNT: PAYROLL JSNAME: JREPORT
The following is the log record format:
Table 13-9. Type 138 Record Format
length, in 16-bit
words
Record Content
1 Record type (138)
1 Record length
1 Process identification number
3 Time stamp
2 Job type/job number
25 Target object name
25 Source object name
4 Function
25 Executed from
2 Status
8 User name
8 Group name