CICS creating symlinks receives the following violation:
1CA Mainframe Security - OE REPORT - PAGE 1
DATE 05/06/20 (20.127) TIME 9.17
SERVICE USERID GROUP UID GID SAF RC RSN
DATE TIME JOBNAME SOURCE SYSID CPU SECLABEL
makeFSP USERA G0032107 0 32107 8 4 8
05/06/20 20.127 6.15.40 USERA SY52
No extended reason available for indicated return and reason
Function: symlink User Type: Local
Filename: symlink.file
File Permissions: Owner: rwx Group: rwx Other: rwx
Owning UID: 0 Owning GID: 51622
Volume : VOL069 File Identifier: C4E2E8F0F6F9BE2500000000055B0A86
File Audit Options:
User : Read Failure Write Failure Exec/Search Failure
Auditor : Read None Write None Exec/Search None
****************************************************** Bottom of Data *********
Giving the user ownership to the directory causes the violation to go away.
Release : 16.0
Component : CA Top Secret for z/OS