XYGATE Access Control Reference Manual
XYGATE
®
Access Control Reference Manual
Appendix C: The ACACL File
XYPRO Technology Corporation 185 Proprietary and Confidential
C45: MAP_C_FKEY
This keyword causes XAC to map the original function key to the specified new
function key. The program being executed under XAC’s control receives the new
function key as input. The new function key is logged as the command. This keyword
applies only to CONVERSATIONAL MODE programs.
In CONVERSATIONAL MODE, the following function keys may be used:
[S]F1, [S]F2, [S]F3, ... , [S]F15, [S]F16
The keyword NONE can be used in place of the <new Fkey> parameter. This has the
effect of disabling the <original Fkey>.
The keyword ALL can be used in place of the <original Fkey> parameter. This allows
the specification of a “catch-all” mapping to prevent the use of any function key not
explicitly mentioned (if <new Fkey> is specified as NONE) or map all function keys not
explicitly mentioned to a specific function key.
Note: The order of evaluation of commands is ALIAS, %parameters, FKEY,
ALLOWCMD / DENYCMD, COMMANDESC and RUNCHECK. All FKEY entries
are processed after ALIAS substitutions and %parameters. FKEY entries are
processed in the order in which they are encountered.
Syntax:
MAP_C_FKEY <original Fkey> <new Fkey>
Example:
COMMAND PERUSE
DESCRIPTION "PERUSE FOR CONVENIENCE"
USER GROUP.USER
OBJECT $SYSTEM.SYSTEM.PERUSE
ACL *.* ALIAS:"*"
MAP_C_KEY F6 F5
MAP_C_KEY F7 F5
MAP_C_KEY F8 F5
MAP_C_KEY F9 F5
MAP_C_KEY F10 F5
MAP_C_KEY F11 F5
MAP_C_KEY F12 F5
MAP_C_KEY F13 F5
MAP_C_KEY F14 F5
MAP_C_KEY F15 F5
MAP_C_KEY F16 F5
This example maps all the function keys that would normally cause more than one
page of output to be displayed to map to the F5 key, which displays just about one
page.