XYGATE Access Control Reference Manual
XYGATE
®
Access Control Reference Manual
Appendix E: XAC Host Macros
XYPRO Technology Corporation 249 Proprietary and Confidential
E5: XAC
The XAC macro invokes a XYGATEAC session. It is also used to attach the
XAC_SEG TACL segment that contains all the XYGATEAC macros.
Syntax:
XAC {INSTALL | [ /<Run-options>/ ] [-N<name>] [-A] <ACL-command>}
XAC INSTALL attaches the XAC_SEG TACL segment to the user’s TACL. If the user
already has the XAC_SEG TACL segment installed, it has no other effect.
XAC with an ACL command causes the XYGATEAC process to execute the command
as it is defined in the ACACL file.
Example:
XAC /PRI 130,NAME $LU/EDIT-255
The above example executes the ACACL file entry EDIT-255. The XYGATEAC
process will run at a priority of 130 and a name of $LU.
Example:
XAC -N$LU1 FUP-255
The above example executes the ACACL file entry FUP-255. The FUP process will
execute with a name of $LU1.
Example:
XAC COMPRESS-DISK
The above example executes the ACACL file entry COMPRESS-DISK. The
XYGATEAC process will run at the default priority defined at the time XAC was
installed.