XYGATE Access Control Reference Manual
XYGATE
®
Access Control Reference Manual
Appendix C: The ACACL File
XYPRO Technology Corporation 184 Proprietary and Confidential
C44: MAP_B_FKEY
This keyword causes XAC to map the original function key to the specified new
function key. The program being executed using XAC receives the new function key as
input. The new function key is logged as the command. This keyword applies only to
BLOCK MODE programs.
In BLOCK MODE, the following function keys may be used:
[S]F1, [S]F2, [S]F3, ... , [S]F15, [S]F16
[S]PGDN, [S]PGUP, LNINS, LNDEL, [S]ENT, [S]RLUP, [S]RLDN
The keyword NONE can be used in place of the <new Fkey> parameter. This has the
effect of disabling the <original Fkey>.
The keyword ALL can be used in place of the <original Fkey> parameter. This allows
the specification of a “catch-all” mapping to prevent the use of any function key not
explicitly mentioned (if <new Fkey> is specified as NONE) or map all function keys not
explicitly mentioned to a specific function key.
Note: The order of evaluation of commands is ALIAS, %parameters, FKEY,
ALLOWCMD/DENYCMD, COMMANDESC and RUNCHECK. All FKEY entries
are processed after ALIAS substitutions and %parameters. FKEY entries are
processed in the order in which they are encountered.
Syntax:
MAP_B_FKEY <original Fkey> <new Fkey>
Example:
COMMAND MAIL-CUST-SERV
DESCRIPTION "PSMAIL WITH USER PROFILE DISABLED"
USER MAIL.ADMIN
OBJECT $SYSTEM.SYSTEM.PATHCOM
ACL OPER.*
STARTUP "$TRPM;RUN M6530-1"
MAP_B_KEY F14 NONE
This example ensures that the F14 key is disabled.