Subsystem Control Point (SCP) Management Programming Manual
Commands and Responses
Subsystem Control Point (SCP) Management Programming Manual—520619-001
5-7
Command Security
Command Security
SCP enforces basic command security on the basis of the distinction between sensitive
and nonsensitive commands.
A command capable of affecting SCP’s operation in any way is called a sensitive
command. This includes any command that can change the summary state, status, or
configuration of an SCP process.
A command that retrieves information about an SCP process without affecting the
process in any way is called a nonsensitive command. An application with any access ID
can issue nonsensitive commands.
An SCP process accepts a sensitive command only from a requester that satisfies one of
these requirements:
•
The requester belongs to the super group.
•
The requester has the same ID as the creator access ID (CAID) of the SCP process.
This is true if the requester started the SCP process; therefore, a requester can
always issue sensitive commands to an SCP process that it has started.
Requester Identification
SCP accepts REQID tokens in a command, but only if the requester belongs to the super
ID. If a qualified requester includes REQID tokens in a command, SCP forwards those
tokens to the subsystem. This lets management applications funnel requests from other
requesters through SCP to the subsystem.
Commands and Responses
Commands are listed in alphabetical order. Each command description includes:
•
A description of the command
•
The command number
•
A list of the tokens in the command message and the response
•
A description of any token not previously described in Common Command Tokens
on page 5-2 or Common Response Tokens on page 5-5.