In an environment when both volumes and datasets are secured, when is the dataset check bypassed and when is it not?
Release: Top Secret 16.0
When both volume and data set level access checking are done, Top Secret always performs volume level first. In some cases a request to access a data set is granted or failed strictly on the basis of the ACID's volume access authorizations without checking whether the user is authorized to access that particular data set.
If the ACID is authorized for any volume level access other than CREATE and the request does not exceed this access level, Top Secret allows access to the volume and the data set without checking for DSNAME authorizations. If the ACID owns the volume, access is allowed without any data set validation.
The following table shows how volume access authorizations affect an ACID's request to access a data set on that volume:
Ac
Access Permitted/Access Attempt | Read | Update | Create | Scratch |
NONE | FAIL | FAIL | FAIL | FAIL |
ALL | OKAY | OKAY | OKAY | OKAY |
CREATE | DSNAME CHECK | DSNAME CHECK | DSNAME CHECK | DSNAME CHECK |
READ | OKAY | DSNAME CHECK | FAIL | DSNAME CHECK |
Note: VSAM datasets where the VOLUME check passed is the volume where the catalog resides and NOT where the dataset resides.
TSS ADD(msca) VOL(*ALL*(G))
TSS PERMIT(ALL) VOL(*ALL*(G)) ACCESS(CREATE)