Authorizing user access requires that the administrator of your external security manager perform the following procedure:
What are the Top Secret equivalents?
A resource class has to be defined in the Top Secret RDT record. From the RACF information here is how to define it to CA Top Secret:
TSS ADDTO(RDT) RESCLASS(KC2CLASS) ACLST(NONE,READ,ALL) MAXLEN(24) DEFACC(READ)
It should read when entering : TSS LIST(RDT) RESCLASS(KC2CLASS)
ACCESSORID = *RDT* NAME = RESOURCE DEFINITIONS RESOURCE CLASS = KC2CLASS RESOURCE CODE = X'027' ATTRIBUTE = NOMASK,MAXOWN(08),MAXPERMIT(024),ACCESS ACCESS = NONE(0000),READ(4000),ALL(FFFF) DEFACC = READ TSS0300I LIST FUNCTION SUCCESSFUL
Other access levels can be specified and other attributes as well.
Here it has been defined with NOMASK. It could be defined with MASK depending if you want masking characters allowed in permits for this resource.
RACF Definition:
RDEFINE nnnnnnnn cicsappl.KC2.KILL.TASK UACC(NONE)
Top Secret Equivalent:
TSS ADD(#dept) KC2CLASS(cicsappl)
RACF Definition:
PERMIT cicsappl.KC2.KILL.TASK CLASS(nnnnnnnn) ID(USR1) ACCESS(READ)
Top Secret Equivalent:
TSS PER(USR1) KC2CLASS(cicsappl.KC2.KILL.TASK)
To prevent access to it for anyone in all modes:
TSS PER(ALL) KC2CLASS(cicsappl.KC2.KILL.TASK) ACCESS(NONE) ACTION(FAIL)