version 2 release 4 z/os · switch trace.....125

694
z/OS Version 2 Release 4 SDSF Operation and Customization IBM SA23-2274-40

Upload: others

Post on 26-May-2020

25 views

Category:

Documents


0 download

TRANSCRIPT

  • z/OSVersion 2 Release 4

    SDSF Operation and Customization

    IBM

    SA23-2274-40

  • Note

    Before using this information and the product it supports, read the information in “Notices” on page607.

    This edition applies to Version 2 Release 4 of z/OS (5650-ZOS) and to all subsequent releases and modifications untilotherwise indicated in new editions.

    Last updated: 2020-04-27© Copyright International Business Machines Corporation 1997, 2020.US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract withIBM Corp.© Rocket Software, Inc. 2017, 2020.

  • Contents

    Figures................................................................................................................ xv

    Tables............................................................................................................... xvii

    About this document........................................................................................ xxvii

    z/OS information...............................................................................................xxix

    How to send your comments to IBM................................................................... xxxiIf you have a technical problem.............................................................................................................. xxxi

    Summary of changes....................................................................................... xxxiiiSummary of changes, Version 2 Release 4 (V2R4) as updated April 2020......................................... xxxiii

    Chapter 1. Exploiting new functions.......................................................................1z/OS V2R4 summary as updated September, 2019................................................................................... 1

    Exploiting the Enqueue panel (ENQD)................................................................................................... 1Exploiting the Extended Console panel (EMCS).................................................................................... 2Exploiting the JES Checkpoint panel (CKPT)......................................................................................... 2Exploiting the JES Subsystem panel (JES)............................................................................................ 2Exploiting the Job Class Members panel (JCM).................................................................................... 3Exploiting the Job DDName panel (JDDN).............................................................................................3Exploiting the JESInfo panel (JRI)......................................................................................................... 3Exploiting the JESInfo by Job panel (JRJ).............................................................................................4Exploiting the Job Memory Objects panel (JMO).................................................................................. 4Exploiting the Link Pack Directory panel (LPD)......................................................................................4Exploiting the OMVS Options panel (BPXO)...........................................................................................5Exploiting the Resource Monitor Alerts panel (RMA)............................................................................ 5Exploiting the WLM Policy panel (WLM).................................................................................................6Exploiting the WLM Report Class panel (REPC).....................................................................................6Exploiting the WLM Resource Groups panel (REPC)............................................................................. 6Exploiting the WLM Service Classes panel (SRVC)................................................................................ 7Exploiting the WLM Workloads panel (WKLD)....................................................................................... 7Exploiting the XCF Members and Groups panel (XCFM)....................................................................... 7

    Chapter 2. Using ISFPARMS for customization and security.................................... 9ISFPARMS overview.....................................................................................................................................9

    ISFPARMS format alternatives...............................................................................................................9Converting ISFPARMS assembler macros to statements.........................................................................10Reverting to the ISFPARMS defined with assembler macros...................................................................11

    NOPARM fallback................................................................................................................................. 11Samples......................................................................................................................................................11Auditing ISFPARMS....................................................................................................................................12Diagnosing security....................................................................................................................................12Rules for coding ISFPARMS.......................................................................................................................13

    Statements........................................................................................................................................... 13Assembler macros................................................................................................................................14

    Conditional processing.............................................................................................................................. 14WHEN Statement..................................................................................................................................14

    iii

  • System symbols................................................................................................................................... 16Global initialization parameters (OPTIONS or ISFPMAC).........................................................................16

    Example of the OPTIONS statement and ISFPMAC macro................................................................ 17OPTIONS or ISFPMAC reference......................................................................................................... 17

    Server connection (CONNECT).................................................................................................................. 21Example of the CONNECT statement.................................................................................................. 22CONNECT statement............................................................................................................................22

    Group authorization parameters (GROUP or ISFGRP)..............................................................................23Group membership.............................................................................................................................. 23Group function......................................................................................................................................24Examples of the GROUP statement and ISFGRP macro..................................................................... 24Group membership parameters reference..........................................................................................25Group function parameters reference................................................................................................. 27Action characters and overtypeable fields for each command level..................................................61

    Variable field lists (FLD or ISFFLD)............................................................................................................77Example of the FLD statement and ISFFLD macro............................................................................. 77FLD and ISFFLD syntax........................................................................................................................ 78

    Name tables (NTBL or ISFNTBL)............................................................................................................... 85Examples of the NTBL statement and ISFNTBL macro...................................................................... 85NTBL and ISFNTBL syntax................................................................................................................... 86Usage notes.......................................................................................................................................... 86

    Customized properties (PROPLIST).......................................................................................................... 87Example of the PROPLIST and associated statements...................................................................... 87PROPLIST syntax..................................................................................................................................87

    Code page (TRTAB/TRDEF or ISFTR)......................................................................................................100Examples of the TRTAB statement and ISFTR macro...................................................................... 100TRTAB and ISFTR syntax................................................................................................................... 101Coding a translate table..................................................................................................................... 104

    Chapter 3. Using the SDSF server....................................................................... 107Defining the input.................................................................................................................................... 107Starting the server................................................................................................................................... 108Starting the SDSFAUX server...................................................................................................................108Processing the statements......................................................................................................................108Accessing the server................................................................................................................................108Logging.....................................................................................................................................................109Security.................................................................................................................................................... 109Using the server for sysplex data............................................................................................................ 109

    Device panels..................................................................................................................................... 109Sysplex-wide panels.......................................................................................................................... 109

    Server operator commands.....................................................................................................................110Start the SDSF server......................................................................................................................... 110Start Aux.............................................................................................................................................114Change server options....................................................................................................................... 114Display server options........................................................................................................................117Display Exit.........................................................................................................................................118Display JES......................................................................................................................................... 118Display Task....................................................................................................................................... 119Display User....................................................................................................................................... 120Display information about server communications.......................................................................... 120Refresh ISFPARMS.............................................................................................................................121Set Trace.............................................................................................................................................122Start communications........................................................................................................................122Stop communications........................................................................................................................ 123Stop the SDSF server......................................................................................................................... 123Stop Aux............................................................................................................................................. 124Switch Log.......................................................................................................................................... 124

    iv

  • Switch Trace.......................................................................................................................................125

    Chapter 4. Columns on the SDSF panels............................................................. 127Address Space Memory panel (AS).........................................................................................................127Authorized Program Facility panel (APF)................................................................................................ 129CF Connection panel (CFC)......................................................................................................................130CF Structure panel (CFS)......................................................................................................................... 131Common Storage Remaining panel (CSR) ..............................................................................................133Device Activity panel (DEV) .................................................................................................................... 134Display Active Users panel (DA)..............................................................................................................135Dynamic Exits panel (DYNX)....................................................................................................................138Enclaves panel (ENC)...............................................................................................................................139Enqueue panel (ENQ).............................................................................................................................. 141Extended Console panel (EMCS) ............................................................................................................ 142File Systems panel (FS) .......................................................................................................................... 144Generic Tracker panel (GT) .................................................................................................................... 145Health Check History panel (CKH).......................................................................................................... 146Health Checker panel (CK)...................................................................................................................... 146Held Output panel (H)..............................................................................................................................148Initiator panel (INIT)............................................................................................................................... 152Input Queue panel (I).............................................................................................................................. 153JES Checkpoint panel (CKPT)..................................................................................................................157JESInfo panel (JRI)..................................................................................................................................158JESInfo by Job panel (JRJ)..................................................................................................................... 159JES Subsystem panel (JES).....................................................................................................................160JESPLEX panel (JP)..................................................................................................................................161Job Class Members panel (JCM)............................................................................................................. 161Job Class panel (JC)................................................................................................................................ 162Job Data Set panel (JDS).........................................................................................................................164Job Delay panel (JY)................................................................................................................................ 168Job Dependency panel (JP).....................................................................................................................169Job Device panel (JD)..............................................................................................................................170Job DDName panel (JDDN)..................................................................................................................... 172Job Group panel (JG)...............................................................................................................................173Job Memory panel (JM)........................................................................................................................... 174Job Memory Objects panel (JMO)...........................................................................................................175Job Module panel (JC) ............................................................................................................................ 176Job Step panel (JS)..................................................................................................................................177Job Tasks panel (JT) ...............................................................................................................................179Job 0 (J0)................................................................................................................................................. 180Lines panel (LI)........................................................................................................................................ 181Link List panel (LNK)................................................................................................................................ 183Link Pack Area panel (LPA)......................................................................................................................184Link Pack Directory panel (LPD).............................................................................................................. 185Multi-Access Spool panel (MAS) and JESPLEX (JP) panel..................................................................... 186Network Activity panel (NA) ................................................................................................................... 188Network Connections (NC) ..................................................................................................................... 189Network Servers (NS).............................................................................................................................. 191Nodes panel (NO).................................................................................................................................... 192OMVS options panel (BPXO)....................................................................................................................194Output Descriptors panel (OD)................................................................................................................195Output Queue panel (O).......................................................................................................................... 197Page panel (PAG)..................................................................................................................................... 200PARMLIB panel (PARM)........................................................................................................................... 201Printer panel (PR).................................................................................................................................... 202Proclib panel (PROC)............................................................................................................................... 207Processes panel (PS)............................................................................................................................... 208

    v

  • Punch panel (PUN)...................................................................................................................................209Reader panel (RDR)................................................................................................................................. 212Resource panel (RES).............................................................................................................................. 214Resource Monitor panel (RM)..................................................................................................................214Resource Monitor Alerts panel (RMA).....................................................................................................215Scheduling Environment panel (SE)........................................................................................................216Spool Offload panel (SO)......................................................................................................................... 216Spool Volumes panel (SP)....................................................................................................................... 219Search panel (SRCH)............................................................................................................................... 221SMS Groups panel (SMSG) ..................................................................................................................... 222SMS Volumes panel (SMSV) ................................................................................................................... 223Status panel (ST)..................................................................................................................................... 224Subsystem panel (SSI)............................................................................................................................ 228System Symbols panel (SYM)..................................................................................................................229System panel (SYS)................................................................................................................................. 230System Requests panel (SR)................................................................................................................... 232Virtual Storage Map panel (VMAP) ......................................................................................................... 233WLM Policy panel (WLM)......................................................................................................................... 234WLM Report Class panel (REPC)............................................................................................................. 234WLM Resource Group panel (RGRP)....................................................................................................... 235WLM Service Classes panel (SRVC).........................................................................................................236WLM Workload panel (WKLD)................................................................................................................. 237XCF Members and Groups panel (XCFM)................................................................................................238

    Chapter 5. Using SAF for security....................................................................... 241Relationship of SAF and ISFPARMS........................................................................................................ 241

    Using ISFPARMS as a backup to SAF................................................................................................ 241Changing authorization dynamically....................................................................................................... 242Auditing access attempts........................................................................................................................242Diagnosing security................................................................................................................................. 242SAF concepts for SDSF resources...........................................................................................................243

    Protecting SDSF function................................................................................................................... 243

    Chapter 6. SDSF and RACF.................................................................................257Security administration........................................................................................................................... 257Brief summary of RACF commands........................................................................................................ 257Delegation of RACF administrative authority..........................................................................................258

    SDSF resource group class................................................................................................................ 258Establishing SAF security with RACF...................................................................................................... 259

    RACF authorization checking and ISFPARMS security..................................................................... 259Considerations for broad access....................................................................................................... 259

    Using RACLIST and REFRESH................................................................................................................. 259Using RACLIST and REFRESH with the SDSF class...........................................................................260Using RACLIST and REFRESH with the OPERCMDS class................................................................ 260

    Using conditional access......................................................................................................................... 260Sample RACF commands........................................................................................................................ 261Multilevel Security................................................................................................................................... 261

    Chapter 7. Protecting SDSF functions.................................................................263Action characters.....................................................................................................................................263

    Protecting the objects of action characters...................................................................................... 263Protecting the generated MVS and JES commands..........................................................................264Protecting action characters as separate resources ........................................................................265Setting up generic profiles................................................................................................................. 265Examples of protecting action characters.........................................................................................266Tables of action characters................................................................................................................266

    Authorized program facility data sets..................................................................................................... 296

    vi

  • Protecting authorized program facility data sets.............................................................................. 296Example of protecting authorized program facility data sets...........................................................297

    Authorized SDSF commands...................................................................................................................297Protecting SDSF commands.............................................................................................................. 297Setting up generic profiles................................................................................................................. 300Examples of protecting commands...................................................................................................300

    CF connections........................................................................................................................................ 301Protecting CF connections................................................................................................................. 301Example of CF connections............................................................................................................... 301

    CF structures............................................................................................................................................301Protecting CF structures.................................................................................................................... 301Example of CF structures...................................................................................................................302

    Checks on the CK and CKH panels..........................................................................................................302Protecting checks...............................................................................................................................302Example of protecting checks........................................................................................................... 302

    Destination names...................................................................................................................................303Protecting destination names............................................................................................................303Initializing destinations......................................................................................................................303Example of protecting destination names........................................................................................ 304

    Destination operator authority................................................................................................................304Protecting operator authority by destination.................................................................................... 304

    Device activity information......................................................................................................................305Protecting device activity...................................................................................................................305Example of protecting device information........................................................................................ 306

    Dynamic exit information........................................................................................................................ 306Protecting dynamic exits....................................................................................................................306Example of protecting dynamic exits................................................................................................ 307

    EMCS consoles information.....................................................................................................................307Protecting EMCS consoles................................................................................................................. 307Example of protecting EMCS consoles..............................................................................................307

    Enclaves................................................................................................................................................... 307Protecting enclaves............................................................................................................................307Example of protecting enclaves........................................................................................................ 308

    Enqueue information............................................................................................................................... 308Protecting Enqueue Information....................................................................................................... 308Example of protecting enqueue information.....................................................................................308

    File system information...........................................................................................................................308Protecting file systems.......................................................................................................................308Example of protecting file systems................................................................................................... 308

    Generic tracker events............................................................................................................................ 309Protecting generic tracker events......................................................................................................309Example of protecting generic tracker events.................................................................................. 309

    Initiators.................................................................................................................................................. 309Protecting initiators............................................................................................................................309Example of protecting initiators........................................................................................................ 310

    JES2 resources on the RM panel.............................................................................................................310Protecting JES2 resources.................................................................................................................310Example of protecting JES2 resources............................................................................................. 311

    JES subsystems.......................................................................................................................................311Protecting JES subsystems............................................................................................................... 311Example of protecting JES subsystems............................................................................................ 311

    Job classes.............................................................................................................................................. 312Protecting job classes........................................................................................................................ 312Example of protecting job classes.....................................................................................................312

    Job class members..................................................................................................................................312Protecting job class members........................................................................................................... 312Example of protecting job class members........................................................................................ 312

    Job devices.............................................................................................................................................. 312

    vii

  • Protecting job devices........................................................................................................................313Example of protecting job devices.................................................................................................... 313

    Jobs, job groups, output groups, and SYSIN/SYSOUT data sets........................................................... 313Protecting jobs, job groups, output groups, and SYSIN/SYSOUT data sets.....................................313Permitting other users to view your data.......................................................................................... 316Providing function comparable to NOTIFY authority........................................................................316Examples of protecting jobs and output groups............................................................................... 316

    JESInfo resources................................................................................................................................... 318Protecting JESInfo resources............................................................................................................ 318Example of protecting JESInfo resources.........................................................................................318

    JESInfo by job resources.........................................................................................................................318Protecting JESInfo by job resources................................................................................................. 318Example of protecting JESInfo by job resources.............................................................................. 319

    Lines......................................................................................................................................................... 319Protecting lines.................................................................................................................................. 319Example of protecting lines............................................................................................................... 319

    Link list data sets..................................................................................................................................... 320Protecting link list data sets.............................................................................................................. 320Example of protecting link list data sets........................................................................................... 320

    MAS and JESPLEX members................................................................................................................... 320Protecting MAS and JESPLEX members............................................................................................320Example of protecting MAS members...............................................................................................321

    Membership in groups.............................................................................................................................321Controlling membership in groups.................................................................................................... 321Example of protecting membership in a group in ISFPARMS...........................................................321

    MVS and JES commands on the command line......................................................................................321Protecting the slash command.......................................................................................................... 321Slash command and User Log........................................................................................................... 322Example of protecting the slash command.......................................................................................322

    Network activity.......................................................................................................................................322Protecting network activity................................................................................................................ 322Example of protecting network activity.............................................................................................323

    Network connections...............................................................................................................................323Protecting network connections........................................................................................................323Example of protecting network connections.................................................................................... 323

    Network servers.......................................................................................................................................324Protecting network servers................................................................................................................324Example of protecting network servers............................................................................................ 324

    Nodes....................................................................................................................................................... 324Protecting nodes................................................................................................................................ 324Example of protecting nodes.............................................................................................................325

    OMVS options...........................................................................................................................................325Protecting OMVS options................................................................................................................... 325Example of protecting OMVS options................................................................................................325

    OPERLOG................................................................................................................................................. 325Protecting the log stream.................................................................................................................. 326

    Overtypeable fields..................................................................................................................................326Protecting the overtypeable field...................................................................................................... 326Protecting the objects of overtypeable fields................................................................................... 326Protecting the generated MVS and JES commands..........................................................................327Generic profiles.................................................................................................................................. 327Examples of protecting overtypeable fields......................................................................................328Tables of overtypeable fields.............................................................................................................329

    Page data sets..........................................................................................................................................368Protecting page data sets.................................................................................................................. 368Example of protecting page data sets............................................................................................... 368

    PARMLIB data sets.................................................................................................................................. 369Protecting PARM data sets.................................................................................................................369

    viii

  • Example of protecting PARM data sets............................................................................................. 369Printers.....................................................................................................................................................369

    Protecting printers............................................................................................................................. 369Permitting access only while using SDSF..........................................................................................370Examples of protecting printers........................................................................................................ 370

    Processes (z/OS UNIX System Services)................................................................................................ 370Protecting processes......................................................................................................................... 370Example of protecting processes...................................................................................................... 371

    Proclibs.................................................................................................................................................... 371Protecting proclibs............................................................................................................................. 371Example of protecting proclibs..........................................................................................................371

    Punches................................................................................................................................................... 371Protecting punches............................................................................................................................ 371Permitting access only while using SDSF..........................................................................................372Example of protecting punches......................................................................................................... 372

    Readers.................................................................................................................................................... 372Protecting readers..............................................................................................................................372Example of protecting readers.......................................................................................................... 373

    Resource monitor alerts.......................................................................................................................... 373Protecting resource monitor alerts....................................................................................................373Example of protecting resource monitor alerts................................................................................ 373

    Resources defined to WLM......................................................................................................................373Protecting WLM resources................................................................................................................. 373Example of protecting resources.......................................................................................................374

    Scheduling environments........................................................................................................................374Protecting scheduling environments.................................................................................................374Example of protecting scheduling environments............................................................................. 374

    SDSF server..............................................................................................................................................374Protecting the SDSF server................................................................................................................ 375Examples of protecting the SDSF server........................................................................................... 375

    SMS storage groups.................................................................................................................................375Protecting SMS storage groups......................................................................................................... 375Example of protecting SMS storage groups...................................................................................... 376

    SMS volumes............................................................................................................................................376Protecting SMS volumes.................................................................................................................... 376Example of protecting SMS volumes.................................................................................................377

    Spool offloaders.......................................................................................................................................377Protecting spool offloaders................................................................................................................377Example of protecting spool offloaders............................................................................................ 377

    Spool volumes......................................................................................................................................... 377Protecting spool volumes.................................................................................................................. 377Example of protecting spool volumes............................................................................................... 378

    Subsystems..............................................................................................................................................378Protecting subsystems.......................................................................................................................378Example of protecting subsystems................................................................................................... 379

    SYSLOG.................................................................................................................................................... 379Protecting the logical log................................................................................................................... 379

    System Symbol information.................................................................................................................... 379Protecting system symbol information............................................................................................. 379Example of protecting system symbol information.......................................................................... 379

    System information................................................................................................................................. 380Protecting system information.......................................................................................................... 380Example of protecting system information....................................................................................... 381

    System requests...................................................................................................................................... 381Protecting system requests............................................................................................................... 381Example of protecting system requests............................................................................................381

    User log (ULOG)....................................................................................................................................... 382Protecting the ULOG.......................................................................................................................... 382

    ix

  • Examples of protecting ULOG............................................................................................................382XCF groups and members....................................................................................................................... 382

    Protecting XCF groups and members................................................................................................382Example of protecting XCF groups and members.............................................................................383

    Chapter 8. Converting ISFPARMS to SAF security............................................... 385Getting started.........................................................................................................................................385SDSF environment................................................................................................................................... 385Migration considerations......................................................................................................................... 385Examples of RACF security for SDSF groups.......................................................................................... 386

    Providing group authority...................................................................................................................386Group 1 — system programmers....................................................................................................... 387Group 2 — operators.......................................................................................................................... 389Group 3 — end users.......................................................................................................................... 393Summary of profiles for group 1, group 2, and group 3....................................................................396Using the Security Conversion Assist................................................................................................ 399

    Diagnosing security................................................................................................................................. 404

    Chapter 9. Using installation exit routines.......................................................... 405Installation exit routines......................................................................................................................... 405

    Using the ISFUSER module................................................................................................................405Installation exit points.............................................................................................................................406

    SAF considerations for exit points.....................................................................................................406Initialization exit point....................................................................................................................... 406Command authority exit point........................................................................................................... 410SYSOUT display authority exit point..................................................................................................411SDSF termination exit point............................................................................................................... 411Pre-SAF exit point.............................................................................................................................. 412Post-SAF exit point............................................................................................................................ 412SAF indeterminate exit point............................................................................................................. 413Table build exit point......................................................................................................................... 414

    Chapter 10. Installation and configuration considerations.................................. 415JES3 considerations................................................................................................................................ 415

    Getting started running SDSF in the JES3 environment................................................................... 415JES2 considerations................................................................................................................................ 417

    DESTDEF considerations................................................................................................................... 417SDSF with a secondary JES2 subsystem...........................................................................................417

    SDSF considerations................................................................................................................................417Issuing MVS and JES commands............................................................................................................ 417

    Console for issuing MVS and JES commands....................................................................................417Storing MVS and JES commands.......................................................................................................418

    RMF considerations................................................................................................................................. 419ISPF considerations.................................................................................................................................420

    Scrollable main menu and fallback................................................................................................... 421ISFISP entry point..............................................................................................................................421Specifying that SDSF should process JES2.......................................................................................422

    z/OSMF considerations............................................................................................................................422Using the SDSF classic interface....................................................................................................... 435

    Chapter 11. Introduction to SDSF application services........................................437

    Chapter 12. SDSF messages and codes.............................................................. 439Displaying message help.........................................................................................................................439User authorization................................................................................................................................... 439SDSF messages....................................................................................................................................... 439Messages with HSF message numbers...................................................................................................484

    x

  • Messages with ISF message numbers....................................................................................................490Messages for IBM Health Checker for z/OS............................................................................................549SDSF user abend codes...........................................................................................................................556

    Appendix A. SDSF problem management........................................................... 561Observing and identifying a problem...................................................................................................... 561Gathering information about a problem................................................................................................. 561

    Dumps................................................................................................................................................ 561Trace...................................................................................................................................................561Module information............................................................................................................................561

    SDSF problem index................................................................................................................................ 562Problems with the Repeat-Find PF keys (PF5 and PF17).................................................................562Problems with the LOG, RETRIEVE and TUTOR commands.............................................................562Users are experiencing authorization problems............................................................................... 562SDSF has abended............................................................................................................................. 563Documentation is incorrect................................................................................................................563An SDSF message is incorrect........................................................................................................... 563A message was not found in the tutorial........................................................................................... 563Data on an SDSF panel is garbled or incorrect..................................................................................563RMF exit is not installed.....................................................................................................................564

    Appendix B. SAF equivalents for ISFPARMS....................................................... 565ACTION.................................................................................................................................................... 565ACTIONBAR............................................................................................................................................. 565APPC.........................................................................................................................................................565AUPDT...................................................................................................................................................... 565AUTH=ABEND..........................................................................................................................................565AUTH=ACTION........................................................................................................................................ 565AUTH=ALL................................................................................................................................................565AUTH=ALLOPER.......................................................................................................................................566AUTH=ALLUSER.......................................................................................................................................566AUTH=APF............................................................................................................................................... 566AUTH=AS................................................................................................................................................. 566AUTH=CFC............................................................................................................................................... 566AUTH=CFS............................................................................................................................................... 566AUTH=CK................................................................................................................................................. 567AUTH=CSR............................................................................................................................................... 567AUTH=DA................................................................................................................................................. 567AUTH=DEST............................................................................................................................................. 567AUTH=DEV............................................................................................................................................... 567AUTH=DYNX............................................................................................................................................ 568AUTH=EMCS............................................................................................................................................ 568AUTH=ENC...............................................................................................................................................568AUTH=ENQ...............................................................................................................................................568AUTH=FINDLIM....................................................................................................................................... 568AUTH=FS..................................................................................................................................................568AUTH=GT................................................................................................................................................. 568AUTH=H................................................................................................................................................... 569AUTH=I.................................................................................................................................................... 569AUTH=INIT.............................................................................................................................................. 569AUTH=INPUT........................................................................................................................................... 569AUTH=JC..................................................................................................................................................569AUTH=JES................................................................................................................................................569AUTH=JRI................................................................................................................................................ 569AUTH=JRJ................................................................................................................................................570AUTH=JG................................................................................................................................................. 570AUTH=J0..................................................................................................................................................570

    xi

  • AUTH=LI...................................................................................................................................................570AUTH=LNK............................................................................................................................................... 570AUTH=LOG...............................................................................................................................................570AUTH=LPA................................................................................................................................................570AUTH=LPD............................................................................................................................................... 571AUTH=MAS.............................................................................................................................................. 571AUTH=NA.................................................................................................................................................571AUTH=NC................................................................................................................................................. 571AUTH=NO.................................................................................................................................................571AUTH=NS................................................................................................................................................. 571AUTH=O................................................................................................................................................... 571AUTH=OMVS............................................................................................................................................ 572AUTH=PAG...............................................................................................................................................572AUTH=PARM............................................................................................................................................ 572AUTH=PR................................................................................................................................................. 572AUTH=PREF............................................................................................................................................. 572AUTH=PROC............................................................................................................................................ 572AUTH=PS..................................................................................................................................................572AUTH=PUN...............................................................................................................................................573AUTH=RDR...............................................................................................................................................573AUTH=RES............................................................................................................................................... 573AUTH=REPC.............................................................................................................................................573AUTH=RGRP............................................................................................................................................ 573AUTH=RM.................................................................................................................................................573AUTH=RMA.............................................................................................................................................. 573AUTH=RSYS............................................................................................................................................. 574AUTH=SE..................................................................................................................................................574AUTH=SMSG............................................................................................................................................ 574AUTH=SMSV............................................................................................................................................ 574AUTH=SO................................................................................................................................................. 574AUTH=SP..................................................................................................................................................574AUTH=SR................................................................................................................................................. 574AUTH=SRVC.............................................................................................................................................575AUTH=SSI................................................................................................................................................ 575AUTH=ST..................................................................................................................................................575AUTH=SYS............................................................................................................................................... 575AUTH=SYSID........................................................................................................................................... 575AUTH=SYSNAME..................................................................................................................................... 575AUTH=TRACE...........................................................................................................................................575AUTH=ULOG............................................................................................................................................ 576AUTH=VMAP............................................................................................................................................ 576AUTH=WKLD............................................................................................................................................ 576AUTH=WLM..............................................................................................................................................576AUTH=XCFM............................................................................................................................................ 576BROWSE...................................................................................................................................................576CMDAUTH=DEST..................................................................................................................................... 576CMDAUTH=DISPLAY............................................................................................................................... 577CMDAUTH=GROUP..................................................................................................................................577CMDAUTH=INIT...................................................................................................................................... 577CMDAUTH=NOTIFY................................................................................................................................. 577CMDAUTH=MSG...................................................................................................................................... 577CMDAUTH=USERID................................................................................................................................. 578CMDAUTH=ALL........................................................................................................................................ 578CMDLEV....................................................................................................................................................579CONFIRM................................................................................................................................................. 579CPUFMT................................................................................................................................................... 579CTITLE......................................................................................................................................................579CURSOR................................................................................................................................................... 579

    xii

  • DADFLT.................................................................................................................................................... 579DATE.........................................................................................................................................................579DATESEP.................................................................................................................................................. 580DEST.........................................................................................................................................................580DISPLAY................................................................................................................................................... 580DSPAUTH=ADEST.................................................................................................................................... 580DSPAUTH=ALL......................................................................................................................................... 580DSPAUTH=AMDEST................................................................................................................................. 581DSPAUTH=AMSG..................................................................................................................................... 581DSPAUTH=GROUP................................................................................................................................... 581DSPAUTH=GRPMSG................................................................................................................................ 582DSPAUTH=NOTIFY.................................................................................................................................. 582DSPAUTH=USERID.................................................................................................................................. 582EMCSAUTH...............................................................................................................................................582EMCSREQ................................................................................................................................................. 582GPLEN...................................................................................................................................................... 582GPREF...................................................................................................................................................... 582ICMD........................................................................................................................................................ 583IDEST....................................................................................................................................................... 583IDSP......................................................................................................................................................... 583IDSPD.......................................................................................................................................................583ILOGCOL.................................................................................................................................................. 583INPUT.......................................................................................................................................................584ISTATUS...................................................................................................................................................584ISYS..........................................................................................................................................................584LANG........................................................................................................................................................ 584LOG/LOGOPT........................................................................................................................................... 584OWNER.....................................................................................................................................................584PREFIX..................................................................................................................................................... 584RSYS.........................................................................................................................................................584SYSID....................................................................................................................................................... 584UPCTAB....................................................................................................................................................584VALTAB.................................................................................................................................................... 584VIO........................................................................................................................................................... 585XCMD........................................................................................................................................................585XDSP.........................................................................................................................................................585XDSPD...................................................................................................................................................... 585XSTATUS.................................................................................................................................................. 585

    Appendix C. SDSF resource names for SAF security............................................ 587

    Appendix D. Accessibility...................................................................................603Accessibility features.............................................................................................................................. 603Consult assistive technologies................................................................................................................603Keyboard navigation of the user interface..............................................................................................603Dotted decimal syntax diagrams.............................................................................................................603

    Notices..............................................................................................................607Terms and conditions for product documentation.................................................................................608IBM Online Privacy Statement................................................................................................................ 609Policy for unsupported hardware............................................................................................................609Minimum supported hardware................................................................................................................610Programming interface information........................................................................................................610Trademarks..............................................................................................................................................610

    Index................................................................................................................ 611

    xiii

  • xiv

  • Figures

    1. Start Aux Options — Syntax...................................................................................................................... 114

    2. Change Server Options — Syntax..............................................................................................................115

    3. Display Server Options — Syntax..............................................................................................................117

    4. Display Exit Options — Syntax.................................................................................................................. 118

    5. Display JES Options — Syntax.................................................................................................................. 118

    6. Display Task Options — Syntax.................................................................................................................119

    7. Display User Options — Syntax.................................................................................................................120

    8. Display Information About Server Communications — Syntax................................................................120

    9. Refresh ISFPARMS — Syntax.................................................................................................................... 121

    10. Set Trace Options — Syntax....................................................................................................................122

    11. Start Communications — Syntax............................................................................................................ 123

    12. Stop Communications — Syntax.............................................................................................................123

    13. STOP the SDSF Server — Syntax.............................................................................................................124

    14. Stop Aux Options — Syntax.....................................................................................................................124

    15. Switch Log Options — Syntax...............................................