Table of Contents

Search

  1. Preface
  2. Part 1: PowerExchange Change Data Capture Introduction
  3. Part 2: CDC Components Configuration and Management
  4. Part 3: CDC Sources Configuration and Management
  5. Part 4: Change Data Extraction
  6. Part 5: Monitoring and Tuning
  7. Appendix A: CDC for z/OS Troubleshooting
  8. Appendix B: DTL__CAPXTIMESTAMP Time Stamps

Controlling Access to PowerExchange Components

Controlling Access to PowerExchange Components

Some PowerExchange components must have system authorization to run. You can limit access to these components through RACF or an equivalent security product. Use this procedure to limit this access.
To control access to PowerExchange components:
  1. Get the startup procedure names for the following components:
    • PowerExchange Logger
    • PowerExchange Agent
    • Any PowerExchange component running as a started task
  2. Use one of the following methods to provide user authorization for each component:
    • Add the procedure names to the RACF-started procedures table (ICHRIN03), or its equivalent.
    • Create a RACF profile for each procedure name and use the class STARTED.
    This step associates a user ID and group ID with the started tasks. This association provides authorized access to any data set that the tasks use and enables PowerExchange components to pass the authorization-checking process. For more information about the RACF-started procedures table or STARTED class profiles, see the IBM documentation for RACF or an equivalent security product.

0 COMMENTS

We’d like to hear from you!