How To Control CA Top Secret Inbound Commands in CPF environment with the CA Top Secret Site Security Exits?
search cancel

How To Control CA Top Secret Inbound Commands in CPF environment with the CA Top Secret Site Security Exits?

book

Article ID: 9650

calendar_today

Updated On:

Products

Top Secret Top Secret - LDAP

Issue/Introduction

When we would like to do something in the receiving side but when checking TSSINSTX code, we find only one entry for CPF (72).

All notes for this entry point of CPF (Command Propagation Facility) refer to Sending side. 



Environment

Release: TOPSEC00200-15-Top Secret-Security
Component:

Resolution

The TSSINSTX entry to check inbound commands is the COMMAND entry.

It is described as it follows within the TSSINSTX:

TO INTERPRET TSS COMMAND USAGE TXACTGTS CAN BE USED TO DETERMINE THE MACHINE OF ORIGIN WHEN CPF IS IN USE.

TXACTGTS = 0 INDICATES THE COMMAND ORIGINATED ON THE LOCAL MACHINE.

IF TXACTGTS > 0, THEN IT POINTS TO THE 8-CHAR NODE NAME OF THE ORIGINATING MACHINE. 

Additional Information

 

-For CA Top Secret r15.0, refer to CA Top Secret for z/OS User Guide; Chapter #18: Extending Security With Site Security Exits.

 

-For CA Top Secret r16.0, go to docops.ca.com site. 

 

https://docops.ca.com/ca-top-secret-for-z-os/16-0/en/using/extending-security-through-site-security-exits