Safeguard Management Programming Manual (G06.29+, H06.08+, J06.03+)
Commands
Safeguard Management Programming Manual—422086-028
7-2
Command Descriptions
Table 7-2 lists all the commands available in the programmatic control-and-inquiry
interface to the Safeguard subsystem. This table also indicates the commands
accepted by each object.
Command Descriptions
Each command and its response is described in detail on the next pages. All DSM
commands use a predefined subset of SPI and data communications tokens as well as
a unique set of subsystem-specific tokens.
Command descriptions appear in alphabetic order. Each command description
consists of a syntax box that contains the symbolic names of the command and the
objects it accepts, followed by lists of the tokens that can appear in the command and
response buffers. Token descriptions given under the ADD commands are the same
for other commands. Therefore, these descriptions are not duplicated under other
commands.
The notation used for simple tokens is a shorthand version of the essential information
given in the DDL TOKEN-CODE statement. Extensible structured tokens are defined
by DDL DEF statements.
Note. The Safeguard subsystem does not differentiate between sensitive and nonsensitive
commands.
Table 7-2. Commands by Object Type
Command
Null
Sub-
system
User
Alias
Group
Protection
Record
Remote
Password
Audit Pool
(Fileset)
Event
Exit
(Process)
Terminal
(LU)
ACTIVATE No No Yes Yes No Yes No No No Yes
ADD No No Yes Yes Yes Yes Yes Yes Yes Yes
ALTER No Yes Yes Yes Yes Yes Yes Yes Yes Yes
DELETE No No Yes Yes Yes Yes Yes Yes Yes Yes
GETVERSION Yes Yes No No No No No No No No
INFO No Yes Yes Yes Yes Yes Yes Yes Yes Yes
LISTOBJECTS Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes
LISTOPENS No Yes No No No No No No No No
LOAD NoYesNoNoNoNoNoNoNoNo
RELEASE No No No No No No No Yes No No
START NoNoNoNoNoNoNoNoNoYes
STATUS No Yes Yes Yes No Yes No No No No
STOP NoYesNoNoNoNoNoNoNoYes
SUSPEND No No Yes Yes No Yes No No No Yes
SWITCH No No No No No No No Yes No No