Computer Monitor User Manual

CODE
Shows the 3-digit internal identifier of the function.
DESCRIPTION
Displays the 1- to 30-character text description of the function.
FUNCTION
Displays the 1- to 8-character name of the facility within the
product. All functions are listed in the function code table, later in
this chapter.
PRIMARY
Shows the primary resource type for which a function can be
secured. In addition to checking a user ID’s access level for a given
function, Landmark PerformanceWorks MVS products can limit a
user ID’s use of a function to a selected resource, as shown in the
following table.
Value Description
TMON for CICS Primary resources are job names. You can limit the job
names displayed on the Job Selection List screen for a
given user ID using the JOBLIST function.
TMON for DB2 Primary resources are DB2 subsystem names. You can
limit the DB2 subsystems monitored by a given user ID
using the DB2AUTH function.
TMON for DBCTL Primary resources are DBCTL subsystem names. You
can limit the DBCTL subsystems monitored by a given
user ID using the DBCAUTH function.
TMON for
MQSeries
Primary resources are MQSeries object names. You
can limit the queue managers monitored by a given user
ID using the QMGRAUTH function.
TMON for MVS Primary resources are job names or volume serial
numbers. You can limit the ability to display I/O trace
data to specific volumes (based on volume serial
number) using the CCWTRACE function.
This field is blank if the TYPE field contains “S” (system function).
If the value in the TYPE field is “R” (resource function), this field
may contain a value.
PRIMARY/SECONDARY RESOURCE
Displays the abbreviations used for the PRIMARY and
SECONDARY fields shown in the directory. The following table
lists valid values.
Value Description
D The function can be secured by data set name. (For
TMON for MQSeries, this is by object name.)
J The function can be secured by job name.
M The function can be secured by module name.
N The function can be secured by network ID.
T The function can be secured by transaction ID.
Secured Functions Directory Chapter 2: Security Definitions
2-22