XYGATE Access Control Reference Manual
XYGATE
®
 Access Control Reference Manual 
Appendix E: XAC Host Macros 
XYPRO Technology Corporation  249  Proprietary and Confidential 
E5:  XAC 
The XAC macro invokes a XYGATEAC session. It is also used to attach the 
XAC_SEG TACL segment that contains all the XYGATEAC macros. 
Syntax: 
XAC {INSTALL | [ /<Run-options>/ ] [-N<name>] [-A] <ACL-command>} 
XAC INSTALL attaches the XAC_SEG TACL segment to the user’s TACL. If the user 
already has the XAC_SEG TACL segment installed, it has no other effect. 
XAC with an ACL command causes the XYGATEAC process to execute the command 
as it is defined in the ACACL file. 
Example: 
XAC /PRI 130,NAME $LU/EDIT-255 
The above example executes the ACACL file entry EDIT-255. The XYGATEAC 
process will run at a priority of 130 and a name of $LU. 
Example: 
XAC -N$LU1 FUP-255 
The above example executes the ACACL file entry FUP-255. The FUP process will 
execute with a name of $LU1. 
Example: 
XAC COMPRESS-DISK 
The above example executes the ACACL file entry COMPRESS-DISK. The 
XYGATEAC process will run at the default priority defined at the time XAC was 
installed. 










