Landmark Lighting D20R2 06 99 Users Manual The Monitor For MVS 2.0 System Administrator's Guide

2015-02-09

: Landmark-Lighting Landmark-Lighting-D20R2-06-99-Users-Manual-570117 landmark-lighting-d20r2-06-99-users-manual-570117 landmark-lighting pdf

Open the PDF directly: View PDF PDF.
Page Count: 120

DownloadLandmark-Lighting Landmark-Lighting-D20R2-06-99-Users-Manual- The Monitor For MVS 2.0 System Administrator's Guide  Landmark-lighting-d20r2-06-99-users-manual
Open PDF In BrowserView PDF
D20R2-06/99

...a component of the PerformanceWorks for MVS and OS/390 solution suite
Features include the NaviGate communications interface

System
Administrator’s
Guide
Version 2.0

The Monitor for MVS Version 2.0 – a component of the PerformanceWorks for MVS and OS/390
solution suite. Features include the NaviGate communications interface.
System Administrator’s Guide
This manual applies to The Monitor for MVS (TMON for MVS), a proprietary software product of
Landmark Systems Corporation. In North America, Landmark markets and supports TMON for MVS.
Internationally, TMON for MVS is marketed and supported by a network of software marketing firms.
The information contained herein is subject to change. Address comments to:

Landmark Systems Corporation
12700 Sunrise Valley Drive
Reston, Virginia 20191-5804
1-800-775-LMRK (1-800-775-5675)
1-703-464-1300
Edition Date ........... June 1999
D20R2-06/99

Landmark Systems Corporation, the Landmark logo, NaviGate, NaviGraph, NaviPlex,
PerformanceWorks, Pinnacle, and The Monitor are registered trademarks of Landmark Systems
Corporation.
UNIX is a registered trademark in the United States and other countries licensed exclusively through
X/Open Company, Ltd. All other product and brand names mentioned are trademarks or registered
trademarks of their respective holders.
For definitive information with respect to CICS data areas (including control blocks), you should refer
to the appropriate IBM publication as identified in the CICS Library Guide (GC33-0356).

© 1988, 1999 by Landmark Systems Corporation
All rights reserved

This licensed work is confidential and proprietary and the property of Landmark Systems Corporation. Reproduction, disclosure, or use without the specific written authorization of Landmark Systems Corporation is strictly prohibited.

Contents
Using this Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . iii
Organization of this Guide
Notational Conventions . .
Related Documentation . .
Comments . . . . . . . . . .

.
.
.
.

.
.
.
.

.
.
.
.

.
.
.
.

.
.
.
.

.
.
.
.

.
.
.
.

.
.
.
.

.
.
.
.

.
.
.
.

.
.
.
.

.
.
.
.

.
.
.
.

.
.
.
.

.
.
.
.

.
.
.
.

.
.
.
.

.
.
.
.

.
.
.
.

.
.
.
.

.
.
.
.

.
.
.
.

.
.
.
.

.
.
.
.

iii
iii
iv
vi

Chapter 1: Installation Verification Procedure . . . . . . . . . . . . 1-1
IVP Checklist . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1
IVP Steps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1
Chapter 2: Security Definitions . . . . . . . . . . . . . . . . . . . . 2-1
How Product Security Works
Tracing Security Problems . .
Using External Security . . .
Using User Exit Security . . .
Using Internal Security . . . .
Security Definitions Menu . .
User Profiles Directory . . . .
User Definition . . . . . . . .
Secured Functions Directory .
Function Code Table . . . . .
Profiles/Resources Directory
Detail Profile Definition . . .
Function Access Level Table .

.
.
.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.

2-2
2-4
2-4
2-8
2-9
2-14
2-16
2-18
2-21
2-24
2-33
2-36
2-41

Chapter 3: Landmark Product Communication . . . . . . . . . . . 3-1
Access Methods . . . . . . . . . . . . . . . . . . .
Setting Up Landmark Product Communication
Using Explicit Pass-Through . . . . . . . . . . .
Using Implicit Pass-Through . . . . . . . . . . .
Using NaviGate . . . . . . . . . . . . . . . . . . .
Remote Sessions Directory . . . . . . . . . . . . .
Remote Session Definition . . . . . . . . . . . . .
Remote Sessions Logon . . . . . . . . . . . . . .

.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.

. 3-1
. 3-3
3-10
3-12
3-13
3-18
3-21
3-24

Chapter 4: Support and Maintenance . . . . . . . . . . . . . . . . 4-1
Customer Service Satisfaction Guarantee . . .
Year 2000 Compliance Warranty . . . . . . . .
Product Support . . . . . . . . . . . . . . . . . .
Product Maintenance . . . . . . . . . . . . . . .
Configuration Changes and Disaster Recovery

.
.
.
.
.

.
.
.
.
.

.
.
.
.
.

.
.
.
.
.

.
.
.
.
.

.
.
.
.
.

.
.
.
.
.

.
.
.
.
.

.
.
.
.
.

.
.
.
.
.

.
.
.
.
.

.
.
.
.

4-1
4-2
4-2
4-8
4-10

Appendix: TMON for MVS Sample Library . . . . . . . . . . . . . . A-1
Index

The Monitor for MVS 2.0
System Administrator’s Guide

i

Contents

ii

Using this Guide
The Monitor for MVS System Administrator’s Guide includes
information on the TMON for MVS installation verification
procedure as well as support and maintenance procedures. It also
includes information on security, the TMON for MVS Performance
Database, NaviGate, and the distributed sample library.
The audience for this guide includes both technicians and
managers in systems, programming, capacity planning, operations,
and security. A basic understanding of MVS is assumed.
This section provides an overview of the guide, the conventions
used to document product use, and a list of related documentation.
It also describes how to submit comments to Landmark.

Organization of this Guide
This guide is organized into the following chapters and appendix.
Chapter 1: Installation Verification Procedure

Provides a detailed TMON for MVS installation verification
procedure to help ensure all installation steps, documented in
PerformanceWorks for MVS and OS/390 Installation Guide, are
successfully completed.
Chapter 2: Security Definitions

Provides information on using Landmark’s security facilities to
secure TMON for MVS functions.
Chapter 3: Landmark Product Communication

Explains how to use Landmark product communication to define a
network between products and monitor address spaces anywhere
in the network.
Chapter 4: Support and Maintenance

Describes the procedures, including standard maintenance, that
help Customer Services efficiently assist you with TMON for MVS.
Please read this chapter before contacting Customer Services or
your international representative.
Appendix: TMON for MVS Sample Library

Describes the members of the TMON for MVS sample library.

Notational Conventions
The following notational conventions are used in this guide.

The Monitor for MVS 2.0
System Administrator’s Guide

Notation

Description

b

A b with a slash through it indicates a blank.

...

An ellipsis indicates that the previous parameter or
command can be repeated.

iii

Related Documentation

Using this Guide

Notation

Description

’=,()+-*/

These special characters punctuate commands and
command options. The characters must be entered
exactly as shown.

{}

Braces surround required command parameters.

[]

Brackets surround command options.

|

Vertical bars separate command options. Choose one
option from the list.

➥

An arrow identifies a cursor-selectable field or line.
A compass identifies a field that has a built-in connection
to another Landmark MVS product in the same processor
complex. If the other product is active and defined to your
system, cursor-select the field to pass-through to it.

DD

When used in a display format, “DD” indicates the day in a
date, from “01” through “31”.

hh

When used in a display format, “hh” indicates hundredths
of a second.

HH

When used in a display format, “HH” indicates the hour of
a day, from “00” through “23”.

lowercase

Lowercase characters in command format show
information you must supply.

Mixed Case

Mixed-case characters in command format show
abbreviations for commands. Only the uppercase letters
must be entered.

MM

When used in a display format, “MM” indicates minutes or
months. If used in a time field, it represents the minutes
of the hour, from “01” through “59”. If used in a date field,
it represents the month in the year, from “01” through “12”.

n

When used in a display format, “n” indicates an integer.
The number of n’s displayed represents the number of
digits in the integer.

SS

When used in a display format, “SS” indicates the seconds
of a time field, from “00” through “59”.

t

When used in a display format, “t” indicates tenths,
thousandths, or ten thousandths of a second.

YY

When used in a display format, “YY” indicates the year.

underlined text

Default values are underlined.

UPPERCASE

Uppercase characters identify commands or control
statements. These characters must be entered exactly as
shown.

Related Documentation
To order additional copies of
TMON for MVS
documentation, see the order
form in The Monitor for
MVS Release Guide.

The PerformanceWorks for MVS and OS/390 Online Documentation
Library CD-ROM provides all the TMON for MVS documentation
in BookManager READ and Adobe Acrobat Reader formats. It also
provides a copy of Adobe Acrobat Reader.
In addition to this guide, the TMON for MVS documentation
library includes:

iv

Using this Guide

Related Documentation

• The Monitor for MVS Release Guide, which familiarizes TMON
for MVS users with the features in the product.

• PerformanceWorks for MVS and OS/390 Installation Guide, which
includes everything you need to know to install
PerformanceWorks for MVS and OS/390. It describes the
installation procedures designed to enable you to get
PerformanceWorks up and running as quickly and smoothly as
possible. It also addresses a number of the facilities and special
interfaces available to you with the installation of
PerformanceWorks.

• The Monitor for MVS Reference Manual, which provides an
overview of TMON for MVS as well as complete information
for online product use.

• The Monitor for MVS Report Writer, which contains two
sections:

–

Report Writer Reference Manual provides an overview of
Report Writer capabilities and general usage guidelines
that apply to all Landmark performance monitors. Report
Writer JCL and control statements also are provided in this
section.

–

The Monitor for MVS Report Writer Supplement provides
product-specific information, such as data elements,
sample reports, and explanations of product databases and
record types.

The appendixes contain Report Writer messages and codes as well
as tips for using the Report Writer.

• The Monitor for MVS Messages and Codes, which includes error
messages and abnormal termination codes for all TMON for
MVS batch and online processing.

• Landmark File Services User’s Guide, which describes all LFS
components, functions, and commands. It also includes a
product appendix describing the LFS file structure and
SAMPLIB members supplied when you install TMON for MVS.

• Electronic Customer Service System User’s Guide, which describes
Landmark’s Electronic Customer Service system (ECS) that you
can use to access product maintenance 24 hours a day. It
describes hardware and software requirements, registration
procedures, and how to access ECS through the Internet and
Telnet. It also tells you how to access information in a product
conference and download that information from ECS.
Instructions for uploading information to Landmark Customer
Services using a file transfer protocol also are provided.

The Monitor for MVS 2.0
System Administrator’s Guide

v

Comments

Using this Guide

Comments
If you find an error or have any suggestions on how this
publication can better meet your needs, either send an e-mail to
Customer Services at its@landmark.com or call them at
1-800-775-LMRK (5675). When reporting a documentation error,
include the name of the publication, chapter number, section name,
and a detailed description of the error.

vi

Chapter 1: Installation Verification Procedure
After you have successfully installed TMON for MVS, as described
in PerformanceWorks for MVS and OS/390 Installation Guide, follow
the installation verification procedure (IVP) documented in this
chapter to ensure the base TMON for MVS product is properly
installed and functioning in your environment.

IVP Checklist
The following checklist indicates the TMON for MVS components
you will verify during the IVP. Call Customer Services or your
international representative if you have any problems.
1.

Verify the System Selection Menu.

2.

Verify the Activity Monitor.

3.

Verify the Exception Monitor.

4.

Verify the Graphic Monitor.

5.

Verify Collection Analysis.

6.

Verify Supertrace.

7.

Verify Utilities.

8.

Verify the Delay Monitor.

9.

Verify Remote Sessions.

10.

Verify the TMON for CICS NaviGate connection.

11.

Verify the TMON for DB2 NaviGate connection.

IVP Steps
This section includes step-by-step instructions to execute the IVP.
Complete the steps in the order they appear. These steps can be
run during one TMON for MVS session.
1. Verify the System Selection Menu.
The System Selection Menu is the first screen displayed after you
log onto TMON for MVS and enter your user ID and password.
a.

Cursor-select a TMON for MVS system to display the
Primary Menu.

b. To choose an option from the Primary Menu, complete one of
the following steps.

The Monitor for MVS 2.0
System Administrator’s Guide

1-1

IVP Steps

Chapter 1: Installation Verification Procedure
◊

Enter the option number in the SELECTION field.

◊

Cursor-select the option number.

◊

Enter =n, where “n” is the option number.

2. Verify the Activity Monitor.
a.

Select Option 1, Activity Monitor, from the Primary Menu to
display the Activity Monitor Menu.

b. Select Option 1, System Activity, to display the System
Activity Monitor Menu.
c.

Select Option 1, CPU Activity Display, to display the CPU
Activity Display screen. It presents statistics describing the
mix of work and I/O activity currently executing. The
execution status of the workload on the system and
performance statistics for each processor in the physical
configuration are also displayed.

d. Press END or the PF3 key to return to the System Activity
Monitor Menu.
e.

Select Option 8, Expanded Storage Activity, to display the
Expanded Storage Activity screen. Press ENTER to display
statistics. This screen shows how your expanded storage is
being used. It measures both allocation and activity to and
from expanded storage.

f.

Press END or the PF3 key twice to return to the Activity
Monitor Menu.

g. Select Option 2, Workload Monitor, to display the Workload
Monitor Menu.
h. Select Option 1, Workload Service Activity, to display the
Workload Service Activity screen. It provides an overview
of resource consumption and response time information for
each workload defined to TMON for MVS.
i.

Press END or the PF3 key twice to return to the Activity
Monitor Menu.

j.

Select Option 3, Job Execution Monitor, to display the Job
Execution Monitor screen. It displays systemwide
statistics, the current status, and resource use of all jobs
shown.

k. Cursor-select a job name to display the Job Detail Selection
Menu.
l.

Press END or the PF3 key twice to return to the Activity
Monitor Menu.

m. Select Option 4, Virtual Storage Monitor, to display the
Virtual Storage Monitor Menu.
n. Select Option 4, Common Storage Monitor, to display the
Common Storage Monitor Menu.

1-2

Chapter 1: Installation Verification Procedure

IVP Steps

o. Select Option 5, Common Storage Summary, to display the
Common Storage Summary screen. It shows information
about the allocation and use of common storage areas.
p. Press END or the PF3 key three times to return to the Activity
Monitor Menu.
q. Select Option 5, Performance Parameters, to display the
Performance Parameters Menu.
r.

Select Option 2, Logical Swap Constants, to display the
Logical Swap Constants screen. It shows the thresholds
and measurements that SRM uses to control logical
swapping.

s.

Press END or the PF3 key twice to return to the Activity
Monitor Menu.

t.

Select Option 6, I/O Monitor, to display the I/O Monitor
Menu.

u. Select Option 4, LCU Activity Monitor, to display the LCU
Activity Monitor screen. It provides an overall view of I/O
activity on your system by LCU.
v.

Enter MAINMENU or = on the command line to return to the
Primary Menu.

3. Verify the Exception Monitor.
a.

Select Option 2, Exception Monitor, from the Primary Menu
to display the Exception Monitor Menu.

b. Select Option 5, Threshold Recommendation Utility, to
display the Threshold Recommendation Utility screen. You
can use this screen to analyze your site’s performance data
to determine suggested threshold values that correspond to
the percentiles you specified for each exception severity
level.
c.

Enter MAINMENU or = on the command line to return to the
Primary Menu.

4. Verify the Graphic Monitor.
a.

Select Option 3, Graphic Monitor, from the Primary Menu to
display the Graphic Monitor screen. It provides a snapshot
of the activity on your system.

b. Cursor-select the CPU BUSY field to display the CPU Activity
Display screen.
c.

Enter MAINMENU or = on the command line to return to the
Primary Menu.

5. Verify Collection Analysis.
a.

The Monitor for MVS 2.0
System Administrator’s Guide

Select Option 4, Collection Analysis, from the Primary Menu
to display the Collection Analysis Graphic Review screen.
It shows resource consumption and TSO first period
response time.
1-3

IVP Steps

Chapter 1: Installation Verification Procedure

b. Cursor-select the CPU BUSY field to display the CPU History
Activity Menu.
c.

Enter MAINMENU or = on the command line to return to the
Primary Menu.

6. Verify Supertrace.
a.

Select Option 5, Supertrace, from the Primary Menu to
display the Supertrace Menu.

b. Select Option 4, System Memory Profile, to display the
System Memory Profile screen. It shows information on
storage usage by address space during the last interval.
c.

Enter MAINMENU or = on the command line to return to the
Primary Menu.

7. Verify Utilities.
a.

Select Option 6, Utilities, from the Primary Menu to display
the Utilities Menu.

b. Select Option 1, Systems Services, to display the Systems
Services Menu.
c.

Select Option 1, APF Utility, to display the APF Utility screen.
It shows the data set name and volume serial number of
every currently authorized library in the APF list.

d. Enter MAINMENU or = on the command line to return to the
Primary Menu.
8. Verify the Delay Monitor.
a.

Select Option 7, Delay Monitor, from the Primary Menu to
display the Delay Monitor Menu.

b. Select Option 1, Delay Analysis Summary, to display the
Delay Analysis Summary screen. It shows a breakdown of
delay activity by job.
c.

Enter MAINMENU or = on the command line to return to the
Primary Menu.

9. Verify Remote Sessions.
a.

Select Option S, System Administration, from the Primary
Menu to display the System Administration Menu.

b. Select Option 1, Remote Sessions, to display the Remote
Sessions Directory screen. It lists all Landmark products
defined in your network.
Review each entry. If no changes are required, skip Steps c and
d.
c.

1-4

If the VTAM definition shipped in the TMON for MVS
.INSTLIB has been modified by your site, enter the prefix
characters of VTAM SLU names in the SLU APPLID
PREFIX field. (The shipped TMON for MVS default is

Chapter 1: Installation Verification Procedure

IVP Steps

“TMV”). Your site-specified SLU APPLID PREFIX remains
on the screen.
d. If the applids defining other Landmark PerformanceWorks
MVS products have been modified at your site, select the
appropriate line, overtype the applid, and cursor-select
ADD. You will receive the following message.
LMRK00904I

RECORD WAS SUCCESSFULLY ADDED

If any other message is received, refer to The Monitor for MVS
Messages and Codes to determine the reason for the message
and the corrective action.
Repeat Step d for each entry that requires modification.
e.

Enter =A.1 on the command line to display the Remote
Sessions Logon screen. You can use this screen to access an
applid of another Landmark product.

f.

Cursor-select any line that reflects a status of “ACTIVE”. You
should be transferred to the selected Landmark
PerformanceWorks MVS product.

g. Press the PF3 key or enter LOGOFF on the command line to
return to the TMON for MVS Remote Sessions Logon
screen.
10. Verify the TMON for CICS NaviGate connection.
a.

Enter =1.3 on the command line to display the Job Execution
Monitor screen.

b. Tab twice to position the cursor at the DISPLAY field, and
enter C. The display of active tasks is reduced to show only
CICS tasks.
c.

Cursor-select any CICS task to display the Job Detail Selection
Menu.

d. Select Option 11, NaviGate to CICS/DB2 Monitor, to display
the TMON for CICS Primary Menu.
e.

Select Option 4, MVS Contention Monitor, to display the MVS
Contention Monitor Menu.

f.

Select Option 1, Active Job Summary, to display the TMON
for MVS Job Execution Monitor screen.

g. Press the PF3 key to display the TMON for CICS MVS
Contention Monitor Menu.
h. Select Option 2, Detailed Analysis, to display the TMON for
MVS Job Delay Analysis screen.

The Monitor for MVS 2.0
System Administrator’s Guide

i.

Press the PF3 key to display the TMON for CICS MVS
Contention Monitor Menu.

j.

Enter =7 on the command line to display the TMON for CICS
File/DB Analysis Menu.
1-5

IVP Steps

Chapter 1: Installation Verification Procedure

k. Select Option 1, File/DB Activity, to display the TMON for
CICS File/DB Activity Selection Menu.
l.

Tab to the SUMMARIZE BY field, overtype the “1” with a “2”
and press ENTER. The TMON for CICS File/DB Activity
screen is displayed.

m. Cursor-select any active volume listed in the VOLSER
column to display the Device Detail Selection Menu. The
following message appears on the screen.
TMVS18879I - I/O PROFILE SUCCESSFULLY STARTED

Press ENTER.
Wait approximately two minutes before proceeding to the next
step unless the following message appears on the screen.
TMVS09701I I/O PROFILE COMPLETED. TYPE =5.1 TO ACCESS PROFILE MENU

n. Enter =5.1 on the command line to display the TMON for
MVS Profile Status/Selection screen.
o. Cursor-select the completed I/O profile to display the I/O
Profile screen.
p. Enter KEEP on the command line. The following message
appears on the screen.
TMVS14002I - TRACE DATA IS NOW KEPT

q. Enter MAINMENU or = on the command line to display the
TMON for MVS Primary Menu.
r.

Enter LOGOFF on the command line and press ENTER to
return to the TMON for CICS File/DB Activity Display
screen.

s.

Enter LOGOFF on the command line and press ENTER to
return to the TMON for MVS Job Execution Monitor screen.

At this point, all connections to TMON for CICS should have been
terminated automatically with the reverse-video name of the
“current” monitor (bottom center of border) removed.
11. Verify the TMON for DB2 NaviGate connection.
a.

Enter =1.3 on the command line to display the Job Execution
Monitor screen.

b. Tab twice to position the cursor at the DISPLAY field, and
enter D. The display of active tasks is reduced to show
only DB2 tasks.
c.

Cursor-select any DB2 task to display the Job Detail Selection
Menu.

d. Select Option 11, NaviGate to CICS/DB2 Monitor, to display
the TMON for DB2 Primary Menu.
1-6

Chapter 1: Installation Verification Procedure

IVP Steps

e.

Select Option 4, Active Job Summary, to display the TMON
for MVS Job Execution Monitor screen.

f.

Press the PF3 key to display the TMON for MVS Primary
Menu.

g. Press the PF3 key to display the TMON for DB2 Primary
Menu.
h. Press the PF3 key to display the TMON for MVS Job
Execution Monitor screen.
At this point, all connections to TMON for DB2 should have been
terminated automatically with the reverse-video name of the
“current” monitor (bottom center of border) removed.
i.

The Monitor for MVS 2.0
System Administrator’s Guide

Enter LOGOFF on the command line to log off of TMON for
MVS.

1-7

Chapter 1: Installation Verification Procedure

1-8

Chapter 2: Security Definitions
You can secure access to your Landmark PerformanceWorks MVS
product and its individual functions using three different methods:
External Security, User Exit Security, and Internal Security. You
also can choose not to secure product functions at all. Use the
Security Definitions Menu to select the particular type of security
you want.
External Security controls product usage through IBM’s system
authorization facility (SAF), which transfers control to security
products such as RACF, CA-ACF2, and CA-TOP SECRET.
User Exit Security lets you create your own security system through
user exits.
Internal Security controls product usage through screens described
in this chapter. Please note that while Internal Security provides
complete protection of all secured functions, it does not produce an
audit trail. If your site requires an audit trail, use External Security
to protect access to secured functions.
Landmark PerformanceWorks MVS products check security in the
following two areas.

• User logon security controls the ability to log onto the product.
• Function security protects various product functions. Only
specific functions of Landmark PerformanceWorks MVS
products are secured, as defined on the Secured Functions
Directory screen. A complete list of secured functions is
provided later in this chapter.
Landmark PerformanceWorks MVS products support certain
combinations of Internal, External, User Exit, and no security for
user logon and function security. For example, you might use
External Security to control user logon access and Internal Security
to control access to functions. The following table identifies the
valid security combinations.
User Logon Security
Type

Function Security Type
Internal

External

User Exit

None

External

Yes

Yes

Yes

Yes

User Exit

Yes

No

Yes

Yes

Internal

Yes

No

Yes

Yes

None

No

No

No

Yes

Key: Yes = a valid combination No = an invalid combination

Resolving accidental access
problems caused by security

The Monitor for MVS 2.0
System Administrator’s Guide

If, while defining your system security, you find you cannot access
your system because of the security you have established, you
must restore the primary control record (the C record) in the
control file. Use the sample JCL provided in the appropriate
member of your product sample library to do the restore. The
2-1

How Product Security Works

Chapter 2: Security Definitions

following table identifies the sample library member you should
use for each Landmark PerformanceWorks MVS product.
Member

Sample Library

TCECRS

TMON for CICS/ESA

TMON8CRS

TMON for CICS/MVS

TDBCRS

TMON for DB2

TDCCRS

TMON for DBCTL

TMQCRS

TMON for MQSeries

TMVRSTOR

TMON for MVS

How Product Security Works
This section describes how product security components interact.
Figure 2-1 depicts the interaction of the security components.
Users are authorized to use product functions through access levels
specified in profiles. Profiles explicitly assign an access
(authorization) level for each secured function and supply values
for any required primary resources.

Figure 2-1. Security components
2-2

Chapter 2: Security Definitions

How Product Security Works

When a user tries to use a secured function, a security
authorization call is made to verify that the user has the necessary
security clearance. The following information is used in the
security check:

• User ID
• Password (for a sign-on attempt only)
• Function ID
• Access, or authorization, level (NONE, READ, UPDT, CNTL, or
ALTR) of the user ID for the function. Access levels are
described in “Detail Profile Definition,” later in this chapter.
Some Landmark product functions require a primary resource or
both a primary and a secondary resource. These functions are
generically referred to as resource functions. Functions that do not
require resources are called system functions.

• TMON for CICS primary resources are job names; secondary
resources are not used.

• TMON for DB2 primary resources are DB2 subsystem names;
secondary resources are DB2 plan names.

• TMON for DBCTL primary resources are DBCTL subsystem
names; secondary resources are not used. (The primary
resource needed to access a DBCTL subsystem is the DBCTL
subsystem name; thereafter, it is the object name.)

• TMON for MQSeries primary resources are queue manager and
object names; secondary resources are not used. (The primary
resource needed to access a queue manager is the queue
manager name; thereafter, it is the object name.)

• TMON for MVS primary resources are job names or volume
serial numbers; secondary resources are not used.
Primary and secondary resources qualify the security authorization
check. For functions specifying a primary resource, a security
check is made for the function with the specific primary resource.
(For TMON for DB2, if a secondary resource is specified, the
security check is made for the function with both the primary and
secondary resources.) The user is restricted to using the function
only for the resource(s) specified.
TMON for CICS example

Suppose you want to restrict the job names displayed on the Job
Selection List screen for a given user. In the following example,
only jobs with job names starting with “DEV” and “TEST” are
displayed on the Job Selection List screen for user ID SAMPLE.
User ID: SAMPLE
Password: Not needed for this security check
Function ID: JOBLIST

The Monitor for MVS 2.0
System Administrator’s Guide

2-3

Tracing Security Problems

Chapter 2: Security Definitions

Access level: READ
Primary resource: DEV* and TEST*
Secondary resource: None

Tracing Security Problems
Regardless of which type of security you choose to implement
(External, Internal, or User Exit), you may need to trace security
processing and resolve a security problem. Landmark provides a
trace facility for Landmark security processing. To start the
security trace during product initialization, add the
TRACE=SECURITY parameter to the appropriate data set specified
in your startup JCL, which is identified by the following ddnames:

• TMONPRMS (for TMON for CICS/ESA and TMON for
CICS/MVS)

• TMDBPRMS (for TMON for DB2)
• TDBCPRMS (for TMON for DBCTL)
• TMQSPRMS (for TMON for MQSeries)
• TMVSPRMS (for TMON for MVS)
Adding this parameter activates a security trace for Internal
Security for the product. Each time a security check is made, the
check is traced. Read about the data set in your product
installation completion instructions in PerformanceWorks for MVS
and OS/390 Installation Guide.
To activate the trace facility when the product is already executing,
enter $TRACEON on the command line. To deactivate the trace
facility once you have started it, enter $TRACEOFF on the
command line.

Using External Security
External Security links to and uses security definitions specified by
external security products that use IBM’s system authorization
facility (SAF), such as RACF, CA-ACF2, and CA-TOP SECRET.
This discussion of External Security provides general instructions
for defining RACF security for your Landmark PerformanceWorks
MVS product. CA-ACF2 instructions are given in member
ACF2DOC in the Strategic Services sample library. CA-TOP
SECRET instructions are given in member TSDOC in the Strategic
Services sample library. If you do not have RACF, CA-ACF2, or
CA-TOP SECRET installed, you must set up corresponding
definitions using the security product you do have installed.
If you use External Security to control user logon access, you can
use any of the security types (internal, external, user exit, or none)
to control access to product functions. If, however, you choose to
2-4

Chapter 2: Security Definitions

Using External Security

use External Security for access to product functions, you also must
use External Security for logon access.
If you want to use External Security for logon and Internal or User
Exit Security for functions, you can bypass the RACF, CA-TOP
SECRET, and CA-ACF2 instructions we supply. Read “External
Security Simplified Sign-On,” later in this section.
Considerations when
switching to External Security

RACF Security

If you switch from Internal Security for product functions to
External Security without defining anything to your external
security product, you will not be able to access your system. If this
happens, you must restore the primary control record (the C
record) in the control file. Use the sample JCL given in the
appropriate member of your product sample library to do the
restore. Refer to the table provided earlier in this chapter for the
member you should use for your Landmark PerformanceWorks MVS
product.
To define RACF security for your product’s user logon and
functions, complete the following steps. Refer to your RACF
documentation for complete information on RACF processing.
1.

Add $LMRKTMR to the RACF class descriptor table.
Add the resource class, $LMRKTMR, to the RACF class descriptor
table (CDT). Then reassemble the table (see member
$RACFCDT in the Strategic Services sample library).

2.

Add $LMRKTMR to the RACF router table.
Add two entries for the $LMRKTMR resource class to the RACF
router table, as shown in member $RACFRTB in the Strategic
Services sample library. Then reassemble the table.
To reduce the amount of time the product spends reading the
RACF data set, we recommend you place the router table
entries directly in the RACLIST.

3.

Activate $LMRKTMR in RACF.
Enter the following RACF command to activate the $LMRKTMR
resource class in RACF.
SETROPTS CLASSACT($LMRKTMR)

4.

Define your product user IDs to RACF.
If you have not already done so, define your product user IDs to
RACF.

Note

When RACF passwords are changed, they immediately affect
product security.
5.

Define a RACF general resource for product logon.
Use the following model to define a RACF general resource for
user logon access:

The Monitor for MVS 2.0
System Administrator’s Guide

2-5

Using External Security

Chapter 2: Security Definitions
applid.SIGNON UACC(NONE)

where “applid” is the product application ID defined during
installation and “SIGNON” is the function name that controls
user access and logon to the product. Review the function code
table, later in this chapter, for more information about product
functions. The default user access level should be NONE (no
access to the product), as shown in the UACC parameter in the
model. Logon access to the product is then controlled through
RACF access lists.
6.

Define a RACF general resource for each product function.
To control access to the product functions, use the following model
to define a RACF general resource for each product function:
applid.function[.res1[.res2]] UACC(NONE)

where “applid” is the product application ID defined during
installation, “function” is the function name, “res1” is the
primary resource specification (if any) for this security
definition, “res2” is the secondary resource specification (if
any) for this security definition, and the UACC parameter
specifies the access level for the function. You can specify
asterisks (*) as pattern matching characters for “res1” and
“res2.” The default user access level should be NONE (no
access to product functions), as shown in the UACC parameter
in the model.
You can find descriptions of all product functions, their applicable
resources, and their valid access levels in the function code and
the function access level tables, later in this chapter.
You can find $RACFGDF, a supplied CLIST program, in the
Strategic Services sample library. The CLIST creates a sample
set of RACF general resource definitions for product functions
and resources.
Once general resources are defined for all product functions, access
to them is controlled through RACF access lists.
7.

Activate External Security for user logon access and access to
functions.
Enter X in both the USER LOGON and FACILITIES fields of the
Security Definitions Menu.

With Internal
Security for
Functions

If you are using RACF to secure user logon access, you can use
Internal Security or User Exit Security to control access to product
functions. If you choose to do this, skip Steps 6 and 7 and perform
the following steps instead. You also can use the External Security
simplified sign-on feature described later in this section.
8.

Define Internal Security profiles for your site.
Use the supplied profiles or create your own. Read “Using Internal
Security,” later in this chapter, for further information.

2-6

Chapter 2: Security Definitions

Using External Security

9.

Identify the profile that should be used by each product user ID.
You can use two methods to identify the profile that should be
used for each user ID.
a.

For each product user ID defined to RACF, specify the
following RACF installation data in RACF:
LMRK(profile)

where “profile” is the name of an Internal Security profile.
b. Define each RACF-defined user ID to Internal Security using
the Internal Security screens provided with your Landmark
PerformanceWorks MVS product. Read “Using Internal
Security,” later in this chapter, for more information.
If you do not identify a profile for a user ID, your Landmark
PerformanceWorks MVS product uses the $DEFAULT profile,
which is distributed with each product.
10. Activate External Security for user logon access and Internal
Security for access to functions.
Enter X in the USER LOGON field and an I in the FACILITIES field
of the Security Definitions Menu. The following table indicates
how to access this menu from within each Landmark
PerformanceWorks MVS product.

External Security
Simplified Sign-On

Implementation

The Monitor for MVS 2.0
System Administrator’s Guide

Product

To Gain Access to Menu:

TMON for CICS/ESA

Enter =10.1.7 on the command line of any
TMON for CICS/ESA screen.

TMON for CICS/MVS

Enter =10.1.9 on the command line of any
TMON for CICS/MVS screen.

TMON for DB2

Enter =8.1 on the command line of any
TMON for DB2 screen.

TMON for DBCTL

Enter =9.1 on the command line of any
TMON for DBCTL screen.

TMON for MQSeries

Enter =8.1 on the command line of any
TMON for MQSeries screen.

TMON for MVS

Enter =S.2 on the command line of any
TMON for MVS screen.

If you want to use External Security for user logon access to your
Landmark PerformanceWorks MVS product, but use either Internal
Security or User Exit Security to control user access to product
functions, you can use the External Security simplified sign-on
feature. This feature lets you skip most of the RACF, CA-ACF2,
and CA-TOP SECRET instructions for setting up external user
logon security.
Perform these procedures only after you have consulted with the
data center security personnel at your site. Complete the following
steps to implement the External Security simplified sign-on feature.
2-7

Using User Exit Security

Chapter 2: Security Definitions

1.

Ensure that IBM’s system authorization facility (SAF) is active.
SAF always is active if you are using RACF, but you may need to
perform a manual step to activate SAF with other software
packages. For example, to activate SAF in CA-ACF2, the SAF
bit needs to be turned on in the CA-ACF2 global system
options.

2.

Define product user IDs to your external security product.
If you have not already done so, define product user IDs to your
security product. Refer to the security product documentation
for complete instructions.

3.

Verify the logon access level of the $DEFAULT profile.
If you want to restrict access to a Landmark product to certain user
IDs, ensure that the Landmark-supplied $DEFAULT profile has
an access setting of NONE for the SIGNON function. Read
about product secured functions (including the SIGNON
function) in the function code table, later in this chapter. When
a user logs on, the system checks the user’s profile to see if
SIGNON access is defined. If it is, the logon attempt is
successful. If no profile can be found for the user, the Internal
Security $DEFAULT profile is used.

4.

Activate the External Security simplified sign-on feature for
user logon access.
Enter S at the USER LOGON prompt on the Security Definitions
Menu. Note that you cannot enter S at the FACILITIES prompt.
The External Security simplified sign-on feature is valid only
for control of user logon.

Once you have activated the simplified sign-on feature, all users
already defined to your external security package with valid user
IDs and passwords can log onto the product. If you want to allow
only a subset of these users to log on, you can control user logon
further using profiles and the SIGNON function (as described in
Step 3).

Using User Exit Security
You can create your own security system through user exits.
Member $USRXIT of the Strategic Services sample library contains
a sample security user exit and sample JCL with which to assemble
and link the exit.
To implement User Exit Security, follow these steps:
1.

Create the user exit.
Landmark PerformanceWorks MVS products point register 1 to
storage containing the information mapped in member
$USRPRMS of the Strategic Services sample library. Your user
exit should pass a return code in register 15. If the return code
is zero (0), access to the function is granted. If the return code
is a nonzero number, access to the function is denied.

2-8

Chapter 2: Security Definitions

Using Internal Security

2.

Specify the program name of your user exit in the USEREXIT
startup parameter.
This parameter can be included in a data set or member that is
identified by the:

TMON for DB2 example

–

TMONPRMS DD statement in TMON for CICS/ESA and
TMON for CICS/MVS startup JCL

–

TMDBPRMS DD statement in TMON for DB2 startup JCL

–

TDBCPRMS DD statement in TMON for DBCTL

–

TMQSPRMS DD statement in TMON for MQSeries startup
JCL

–

TMVSPRMS DD statement in TMON for MVS startup JCL.

//TMDBPRMS DD *
USEREXIT=name

If you specify a USEREXIT program name that the product cannot
find when it starts up, an S806 abend occurs.
3.

Stop and restart the product.
Shut down and restart the product.

4.

Activate User Exit Security.
Depending on whether you are using User Exit Security to control
user logon access or access to functions, enter U in either the
USER LOGON field or the FACILITIES field, or both. Check
the user logon/function security type table at the beginning of
this chapter to be sure you are using valid combinations of
security types for these two fields. If no user exit program has
been specified in the USEREXIT startup parameter, an error
occurs indicating you have selected an invalid security
combination.

Using Internal Security
You can use the Internal Security system supplied with your
Landmark PerformanceWorks MVS product to secure user logon
access and access to product functions. If you use Internal Security
to secure logon access, you cannot use External Security to secure
product functions. If you use Internal Security to secure access to
functions, you must secure logon access. You can use any of the
methods described in this chapter to secure logon access.
Internal Security is defined through the screens described in the
rest of this chapter.
Do you require audit trails?

The Monitor for MVS 2.0
System Administrator’s Guide

While Internal Security provides complete protection of all secured
functions, it does not produce an audit trail. If your site requires
an audit trail, use External Security to protect access to secured
functions.

2-9

Using Internal Security

Supplied User IDs and
Profiles

Chapter 2: Security Definitions

Internal Security is distributed with a predefined master user ID
and password for each Landmark PerformanceWorks MVS product.
The following table lists the master user ID and password provided
for each product.
Product

User ID

Password

TMON for CICS/ESA

TMONCICS

TMONCICS

TMON for CICS/MVS

TMONCICS

TMONCICS

TMON for DB2

TMONDB2

TMONDB2

TMON for DBCTL

TMONDBC

TMONDBC

TMON for MQSeries

TMONMQ

TMONMQ

TMON for MVS

TMONMVS

TMONMVS

If you specify that user logon security should use Internal Security
(by setting the USER LOGON field on the Security Definitions
Menu to I), the master user ID can access product Internal Security
screens.
Internal Security for each product also is distributed with a
predefined set of generic authorization profiles and user IDs. Each
of the profiles begins with the dollar sign character ($) and can be
used as a template for definition of site-specific profiles.
Change the supplied
passwords.

TMON for CICS

2-10

If you choose to use Internal Security, once you have installed the
Landmark PerformanceWorks MVS product, change the password
for the master user ID and these other product-supplied user IDs.
When passwords are changed, they immediately affect product
security.
The following table lists the supplied user IDs and profiles for
TMON for CICS/ESA and TMON for CICS/MVS.
User ID

Profile ID

Description

APPROG

$DEFAULT

User ID and default profile ID for an
applications programmer.

AUTOSTRT

$AUTOSTR

User ID and default profile ID for an
automatically started terminal. Read
“Chapter 13: Cross System Monitor
Administration” in The Monitor for CICS
Reference Manual for a description of
Performance Monitor automatic starts.
Do not modify this user ID and profile
ID. If you do, Performance Monitor
automatic starting will not work.

SYSADMN

$SYSADMN

User ID and default profile ID for a
system administrator.

SYSPROG

$SYSPROG

User ID and default profile ID for a
systems programmer.

Chapter 2: Security Definitions

TMON for DB2

TMON for DBCTL

The Monitor for MVS 2.0
System Administrator’s Guide

Using Internal Security

User ID

Profile ID

Description

TMONCICS

$MASTER

Master user ID and default profile ID.
This profile grants user ID TMONCICS
the ability to do everything in TMON for
CICS/ESA. Do not change or delete
this user ID and profile. This ensures
that you always can update your
Internal Security definitions.

The following table lists the supplied user IDs and profiles for
TMON for DB2.
User ID

Profile ID

Description

APPPROG

$DEFAULT

User ID and default profile ID for an
applications programmer.

AUTOSTRT

$AUTOSTR

User ID and default profile ID for an
automatically started terminal. Do not
modify this user and profile ID. If you
do, autostart capabilities are disabled.

DBADM

$DBADM

User ID and default profile ID for a
database administrator.

SYSADM

$SYSADM

User ID and default profile ID for the
TMON for DB2 system administrator.

SYSPROG

$SYSPROG

User ID and default profile ID for a DB2
systems programmer.

TMONDB2

$MASTER

Master user ID and default profile ID.
This profile grants user ID TMONDB2
the ability to do everything in TMON for
DB2. This ensures that you always can
update your Internal Security definitions.

The following table lists the supplied user IDs and profiles for
TMON for DBCTL.
User ID

Profile ID

Description

APPPROG

$DEFAULT

User ID and default profile ID for an
applications programmer.

AUTOSTRT

$AUTOSTR

User ID and default profile ID for an
automatically started terminal. Do not
modify this user and profile ID. If you
do, autostart capabilities are disabled.

DBADM

$DBADM

User ID and default profile ID for a
database administrator.

SYSADM

$SYSADM

User ID and default profile ID for the
TMON for DBCTL system administrator.

SYSPROG

$SYSPROG

User ID and default profile ID for a
DBCTL systems programmer.

TMONDBC

$MASTER

Master user ID and default profile ID.
This profile grants user ID TMONDBC
the ability to do everything in TMON for
DBCTL. This ensures that you always
can update your Internal Security
definitions.
2-11

Using Internal Security

TMON for
MQSeries

TMON for MVS

Implementing Internal
Security

Chapter 2: Security Definitions

The following table lists the supplied user IDs and profiles for
TMON for MQSeries.
User ID

Profile ID

Description

APPPROG

$DEFAULT

User ID and default profile ID for an
applications programmer.

MQADM

$MQADMIN

User ID and default profile ID for an
MQSeries administrator.

SYSADM

$SYSADM

User ID and default profile ID for the
TMON for MQSeries system
administrator.

SYSPROG

$SYSPROG

User ID and default profile ID for an
MQSeries systems programmer.

TMONMQ

$MASTER

Master user ID and default profile ID.
This profile grants user ID TMONMQ the
ability to do everything in TMON for
MQSeries.

The following table lists the supplied user IDs and profiles for
TMON for MVS.
User ID

Profile ID

Description

$DEFAULT

$DEFAULT

User ID and default profile ID for an
applications programmer.

$SYSADMN

$SYSADMN

User ID and default profile ID for a
system administrator.

$SYSPROG

$SYSPROG

User ID and default profile ID for a
systems programmer.

$UPERMAN

$UPERMAN

Master user ID and default profile ID.
This profile grants user ID $UPERMAN
the ability to do everything in TMON for
MVS. This ensures that you always can
update your Internal Security definitions,
do not change or delete this user and
profile ID (except the user ID password).

$SECURITY

$SECURITY

User ID and default profile ID for the
security administrator.

$DBADMIN

$DBADMIN

User ID and default profile ID for the
TMON for MVS control file data
administrator.

To activate Internal Security at your site, follow these steps:
1.

Define Internal Security profiles for your site.
Use the supplied profiles or create your own. Read
“Profiles/Resources Directory” and “Detail Profile Definition,”
later in this chapter, for further information on adding,
updating, and deleting profiles.

2-12

Chapter 2: Security Definitions

Using Internal Security

2.

Define your product users to Internal Security.
Use the supplied user IDs or add your own. Read “User Profiles
Directory” and “User Definition,” later in this chapter, for
further information on adding, updating, and deleting user IDs.

3.

Activate Internal Security.
Depending on whether you are using Internal Security for user
logon access or access to functions, enter I in either the USER
LOGON or the FACILITIES fields (or both) of the Security
Definitions Menu. Check the user logon/function security type
table at the beginning of this chapter to be sure you are using
valid combinations of security types for these two fields.

All the parameters on the Internal Security screens are stored in
records in the product control file. To update the control file once
you have modified the parameters on a screen, you must
cursor-select the ADD, UPDATE, or DELETE field. Cursor-select
the ADD field to add a record to the control file, the UPDATE field
to update a record, and the DELETE field to delete a record. If you
do not cursor-select one of these fields, no modifications are made to
the control file. Read the description of each screen to fully
determine how and when to use the ADD, UPDATE, and DELETE
fields.

The Monitor for MVS 2.0
System Administrator’s Guide

2-13

Security Definitions Menu

Chapter 2: Security Definitions

Security Definitions Menu
JOBNAME:
SYSID :

THE MONITOR FOR MVS
VERSION: 2.0
SECURITY DEFINITIONS MENU

CYCLE MMSS
MAXIMUM USERS:

DATE:
TIME:

SELECTION

127

CURRENT USERS:

1

USER PROFILES DIRECTORY

2

SECURED FUNCTIONS DIRECTORY

3

PROFILES/RESOURCES DIRECTORY

SECURITY METHOD ACTIVE:
USER LOGON:

N

FACILITIES:

N

HELP INFORMATION = PF1

012

(I,X,S,U,N)

PF KEY ASSIGNMENTS = PA1

The Security Definitions Menu lets you specify the type of security
you want to use for logon access to your Landmark
PerformanceWorks MVS product. You also can select product
Internal Security services from this screen.

Accessing this Screen

Options

To access this screen, complete one of the following paths.

Product

Action

Displays

TMON for CICS/ESA

On the command line, enter =10.1.7 .

Security Definitions Menu

TMON for CICS/MVS

On the command line, enter =10.1.9 .

Security Definitions Menu

TMON for DB2

On the command line, enter =8.1 .

Security Definitions Menu

TMON for DBCTL

On the command line, enter =M.1 .

Security Definitions Menu

TMON for MQSeries

On the command line, enter =8.1 .

Security Definitions Menu

TMON for MVS

On the command line, enter =S.2 .

Security Definitions Menu

1

USER PROFILES DIRECTORY

Displays all authorized user IDs for your product and their profile
assignments. Use this option to add, change, or delete user
definitions. These include user ID passwords and profile settings.
2

SECURED FUNCTIONS DIRECTORY

Displays the functions that are secured in your product.
3

PROFILES/RESOURCES DIRECTORY

Displays all currently defined Internal Security profiles and their
qualifying resources for your product. Use this option to add,
change, or delete profile definitions and their associated resources.

2-14

Chapter 2: Security Definitions

Fields

Security Definitions Menu

CURRENT USERS

Displays the current number of users of this product system.
FACILITIES

Specifies the security type used to protect product functions.
Specify one of the options in the following table.
Value

Description

I

Specify I to use Internal Security. This is the default.

N

Specify N if you do not want product functions to be
secured. No security checking is performed.

U

Specify U to use User Exit Security. To use this option,
USEREXIT= also must be coded on the input parameters
for the product.

X

Specify X to use External Security.

Note that you cannot specify S as an access method for function
security. It only pertains to the USER LOGON field.
MAXIMUM USERS

Displays the maximum number of users that can access this
product system at any given time. You can change this maximum
using the MAXUSER command. Read Chapter 2 in your product
reference manual for more information on this command.
SECURITY METHOD ACTIVE

Lists the valid security types you can specify for product functions
(in the FACILITIES field) and user logon access (in the USER
LOGON field). “S” is valid only for the USER LOGON field. See
the FACILITIES and USER LOGON fields for a description of each
value, and check the user logon/function security type table at the
beginning of this chapter for valid combinations of security types.
USER LOGON

Displays the security type used to verify user logon access to the
product. Specify one of the options in the following table.

The Monitor for MVS 2.0
System Administrator’s Guide

Value

Description

I

Specify I to use Internal Security. This is the default.

N

Specify N if you do not want user logon access to be
secured. No security checking is performed.

S

Specify S if you want to use the External Security
simplified sign-on feature.

U

Specify U to use User Exit Security. To use this option,
USEREXIT= also must be coded on the input parameters
for the product.

X

Specify X to use External Security.

2-15

User Profiles Directory

Chapter 2: Security Definitions

User Profiles Directory
JOBNAME:
SYSID :

THE MONITOR FOR MVS
VERSION: 2.0
USER PROFILES DIRECTORY

DATE:
TIME:

COMMAND:
TO "CHANGE" OR "DELETE" : CURSOR SELECT USER ID OR PROFILE ID.
TO "ADD" : CURSOR SELECT ANY USER ID OR PROFILE ID.
USER ID
PROFILE ID
USER NAME
DVDAT
$SYSYUN1
MASTER USER
SECURITY
$SECURTY
SECURITY ADMINISTRATOR
SYSADM
$SYSADM
MVS SYSTEM ADMINISTRATOR
SYSPROG
$SYSPROG
SYSTEMS PROGRAMMER
TMONCICS
$MASTER
MASTER
TMONDB2
$MASTER
MASTER
TMONMVS
$MASTER
MASTER

HELP INFORMATION = PF1

PF KEY ASSIGNMENTS = PA1

The User Profiles Directory screen lists every current user ID
defined to the Landmark PerformanceWorks MVS product and its
associated Internal Security profile ID and user name.

Accessing this Screen
Product

Action

Displays

TMON for CICS/ESA

On the command line, enter
=10.1.7.1 .

User Profiles Directory

TMON for CICS/MVS

On the command line, enter
=10.1.9.1 .

User Profiles Directory

TMON for DB2

On the command line, enter =8.1.1.

User Profiles Directory

TMON for DBCTL

On the command line, enter =M.1.1.

User Profiles Directory

TMON for MQSeries

On the command line, enter =8.1.1.

User Profiles Directory

TMON for MVS

On the command line, enter =S.2.1.

User Profiles Directory

Primary Commands

Fields

To access this screen, complete one of the following paths.

Use the DOWN and UP commands to scroll through this screen. To
learn about the various ways to scroll using these commands and
for syntax and descriptions of all commands, see Chapter 2 in your
product reference manual.

➥ PROFILE ID
Displays the 1- to 8-character profile identifier for the product
currently assigned to the user ID.
Cursor-select this field to add, update, or delete a profile definition
in the control file. Once you have cursor-selected a profile, the
Profiles/Resources Directory screen is displayed.

2-16

Chapter 2: Security Definitions

User Profiles Directory

➥ USER ID
Displays the 1- to 8-character user ID for the product.
Cursor-select this field to add, update, or delete a user definition in
the control file. Once you have cursor-selected a user ID, the User
Definition screen is displayed.
USER NAME

Shows the complete name of the user to whom the specified user
ID and its associated profile ID are assigned. The name can be up
to 34 characters long and is used only for documentation and
identification.

The Monitor for MVS 2.0
System Administrator’s Guide

2-17

User Definition

Chapter 2: Security Definitions

User Definition
JOBNAME:
SYSID :

THE MONITOR FOR MVS
VERSION: 2.0
USER DEFINITION

DATE:
TIME:

COMMAND:
OVERTYPE FIELDS TO "ADD" OR "UPDATE"
USERID:

TMONMVS

PASSWORD:

TMONMVS

USER FULL NAME:

MASTER USER

PROFILE NAME:

$MASTER

<= CURSOR SELECT FOR FURTHER DETAIL

============================================================================
CURSOR SELECT ONE OF THE FOLLOWING:

HELP INFORMATION = PF1

_ADD

_UPDATE

_DELETE

PF KEY ASSIGNMENTS = PA1

The User Definition screen lets you update the product user
definitions in the control file.
You can add a new user definition to the list, update the detailed
information that makes up a user definition, or delete an existing
user definition. The detailed information consists of the user ID,
password, user full name, and profile name defined for the specific
user.

Accessing this Screen

To access this screen, complete one of the following paths.

Product

Action

Displays

TMON for CICS/ESA

On the command line, enter
=10.1.7.1 .

User Profiles Directory

Cursor-select a user ID.

User Definition

TMON for CICS/MVS

On the command line, enter
=10.1.9.1 .

User Profiles Directory

Cursor-select a user ID.

User Definition

On the command line, enter =8.1.1.

User Profiles Directory

Cursor-select a user ID.

User Definition

On the command line, enter =M.1.1.

User Profiles Directory

TMON for DB2
TMON for DBCTL

2-18

Cursor-select a user ID.

User Definition

TMON for MQSeries

On the command line, enter =8.1.1.

User Profiles Directory

Cursor-select a user ID.

User Definition

TMON for MVS

On the command line, enter =S.2.1.

User Profiles Directory

Cursor-select a user ID.

User Definition

Chapter 2: Security Definitions

User Definition

Primary Commands

Enter the following commands on the command line.
ADD

Adds user definitions to the control file.
Type over the appropriate fields
(PASSWORD, PROFILE, USER FULL
NAME, or USERID) to identify the new
user or profile ID; then enter this command
(or cursor-select the ADD field).

DELETE

Deletes user definitions from the control
file. You also can cursor-select the DELETE
field to perform this function.

UPDATE

Updates user definitions in the control file.
Type over the information you want to
change; then enter this command (or
cursor-select the UPDATE field).

For syntax and descriptions of all commands, see Chapter 2 in your
product reference manual.

Fields

➥ ADD
Adds a definition to the control file. Type over the appropriate
fields (PASSWORD, PROFILE, USER FULL NAME, or USERID) to
identify the new user or profile ID; then cursor-select this field to
add the definition to the control file. You also can use the ADD
command to perform this function.

➥ DELETE
Deletes a user definition from the control file.
Cursor-select this field to delete the definition. You also can use
the DELETE command to perform this function.
PASSWORD

Shows the 1- to 8-character password associated with the user ID.
When passwords are changed, they immediately affect product
security.

➥ PROFILE NAME
Displays the 1- to 8-character profile identifier for the product
associated with the user ID.
Cursor-select this field if you need information about a named
profile or if you want to update profile definitions. The
Profiles/Resources Directory screen, described later in this chapter,
is displayed.

➥

UPDATE

Updates a user definition in the control file. Type over the
information you want to change; then cursor-select this field to
update the definition in the control file. You also can use the
UPDATE command to perform this function.

The Monitor for MVS 2.0
System Administrator’s Guide

2-19

User Definition

Chapter 2: Security Definitions

USER FULL NAME

Displays the complete name of the user to whom the specified user
ID and its associated profile ID are assigned. The name can be up
to 34 characters long.
USERID

Displays a 1- to 8-character user ID for the product.

2-20

Chapter 2: Security Definitions

Secured Functions Directory

Secured Functions Directory
JOBNAME:
SYSID :

THE MONITOR FOR MVS
VERSION: 2.0
SECURED FUNCTIONS DIRECTORY

DATE:
TIME:

COMMAND:
TYPE VALUES: S-SYSTEM FUNCTION(NO RESOURCE) / R-RESOURCE FUNCTION
PRIMARY/SECONDARY RESOURCE: J-JOBID,N-NETID,V-VOL,D-DSN,T-TRANID,M-MODULE
FUNCTION CODE CLASS TYPE PRIMARY SECONDARY DESCRIPTION
ADVFUNCS 203 $LMRKTMR S
ADVANCED FUNCTIONS
CCWTRACE 142 $LMRKTMR R
V
CCW I/O PROFILE
CNTLFILE 238 $LMRKTMR S
CONTROL FILE DIRECTORY
CONSOLE
230 $LMRKTMR S
MVS MASTER CONSOLE DISPLAY
CSMON
099 $LMRKTMR S
COMMON STORAGE MONITOR
CSMONDET 097 $LMRKTMR S
COMMON STORAGE MONITOR DETAIL
CSMONOPT 098 $LMRKTMR S
COMMON STORAGE MONITOR OPTIONS
DATADCTS 222 $LMRKTMR S
DATA DICTIONARY SELECTION
DLYGRP
071 $LMRKTMR S
DELAY MONITOR GROUP DEFINITION
DLYGRPG
072 $LMRKTMR S
DELAY MONITOR GLOBAL RECORDS
DLYGRPU
073 $LMRKTMR R
J
DELAY MONITOR USER RECORDS
DLYMNDET 074 $LMRKTMR R
J
DELAY MONITOR DETAIL ANALYSIS
DLYMON
070 $LMRKTMR S
DELAY MONITOR MAIN MENU

HELP INFORMATION = PF1

PF KEY ASSIGNMENTS = PA1

The Secured Functions Directory screen lets you display the
functions that can be secured in the product. You can review each
function, the class to which the function belongs, and the text
description of the function. You also can see which functions are
resource functions (type R) and which are system functions (type S).
All functions are described in the function code table, later in this
chapter. You cannot update any of these functions.

Accessing this Screen

To access this screen, complete one of the following paths.

Product

Action

Displays

TMON for CICS/ESA

On the command line, enter
=10.1.7.2 .

Secured Functions Directory

TMON for CICS/MVS

On the command line, enter
=10.1.9.2 .

Secured Functions Directory

TMON for DB2

On the command line, enter =8.1.2.

Secured Functions Directory

TMON for DBCTL

On the command line, enter =M.1.2.

Secured Functions Directory

TMON for MQSeries

On the command line, enter =8.1.2.

Secured Functions Directory

TMON for MVS

On the command line, enter =S.2.2.

Secured Functions Directory

Primary Commands

Fields

Use the DOWN and UP commands to scroll through this screen. To
learn about the various ways to scroll using these commands and
for syntax and descriptions of all commands, see Chapter 2 in your
product reference manual.

CLASS

Displays the SAF/RACF class.
The Monitor for MVS 2.0
System Administrator’s Guide

2-21

Secured Functions Directory

Chapter 2: Security Definitions

CODE

Shows the 3-digit internal identifier of the function.
DESCRIPTION

Displays the 1- to 30-character text description of the function.
FUNCTION

Displays the 1- to 8-character name of the facility within the
product. All functions are listed in the function code table, later in
this chapter.
PRIMARY

Shows the primary resource type for which a function can be
secured. In addition to checking a user ID’s access level for a given
function, Landmark PerformanceWorks MVS products can limit a
user ID’s use of a function to a selected resource, as shown in the
following table.
Value

Description

TMON for CICS

Primary resources are job names. You can limit the job
names displayed on the Job Selection List screen for a
given user ID using the JOBLIST function.

TMON for DB2

Primary resources are DB2 subsystem names. You can
limit the DB2 subsystems monitored by a given user ID
using the DB2AUTH function.

TMON for DBCTL Primary resources are DBCTL subsystem names. You
can limit the DBCTL subsystems monitored by a given
user ID using the DBCAUTH function.
TMON for
MQSeries

Primary resources are MQSeries object names. You
can limit the queue managers monitored by a given user
ID using the QMGRAUTH function.

TMON for MVS

Primary resources are job names or volume serial
numbers. You can limit the ability to display I/O trace
data to specific volumes (based on volume serial
number) using the CCWTRACE function.

This field is blank if the TYPE field contains “S” (system function).
If the value in the TYPE field is “R” (resource function), this field
may contain a value.
PRIMARY/SECONDARY RESOURCE

Displays the abbreviations used for the PRIMARY and
SECONDARY fields shown in the directory. The following table
lists valid values.

2-22

Value

Description

D

The function can be secured by data set name. (For
TMON for MQSeries, this is by object name.)

J

The function can be secured by job name.

M

The function can be secured by module name.

N

The function can be secured by network ID.

T

The function can be secured by transaction ID.

Chapter 2: Security Definitions

Note

Secured Functions Directory

Value

Description

V

The function can be secured by tape or DASD
volume.

Only J types currently are used by TMON for CICS. Only J and T
types currently are used by TMON for DB2, TMON for DBCTL,
and TMON for MVS. Only D types currently are used by TMON
for MQSeries.
SECONDARY

Shows the secondary resource type for which a function can be
secured.
TMON for DB2 secondary resources are DB2 plan or package
names. Secondary resources qualify security within the limits of
the primary resource. You can restrict the user plans that can be
reviewed by DB2 subsystem name and plan name within DB2
subsystem using the PLANSUMM function.
TMON for CICS, TMON for DBCTL, TMON for MQSeries, and
TMON for MVS do not use secondary resources for any of their
functions.
TYPE

Displays the function type. Valid function types are “R” and “S”
and are explained under the TYPE VALUES field.
TYPE VALUES

Displays the abbreviations used for the TYPE field shown in the
directory. Valid values are “R” (the function is a resource function
and uses a primary resource) and “S” (the function is a system
function and uses no resources); “R” is the default.

The Monitor for MVS 2.0
System Administrator’s Guide

2-23

Function Code Table

Chapter 2: Security Definitions

Function Code Table
The following table describes every product secured function for
Landmark PerformanceWorks MVS products. It is sorted by function
(the second column). You cannot change these functions; they are
predefined by each product.

Note

TMON for CICS, TMON for DBCTL, TMON for MQSeries, and
TMON for MVS do not use secondary resources. Thus, the
Secondary Resource column in the table below applies only to
TMON for DB2 (and in very few instances).
Primary
Resource

Secondary
Resource
Description

Product

Function

Code

TMON for CICS

ACTIVMON

102

none

Controls access to the Activity Monitor.

TMON for DB2

ACTVLOG

053

DB2
subsystem

Controls the ability to display the DB2
Active Log Data Set Statistics screen.

TMON for DB2
TMON for DBCTL

ACTVMON

030
030

none
none

Controls access to Current Thread
Activity screens.

TMON for DB2

ACTVMON

030

none

Controls access to Current Thread
Activity screens.

203
180
180
203
203

none
none
none
none
none

Controls access to advanced functions
on the Advanced Functions menu in
TMON for DB2, TMON for DBCTL,
TMON for MQSeries, and TMON for
MVS; TMON for CICS/ESA does not
support this function.

TMON
TMON
TMON
TMON
TMON

for
for
for
for
for

CICS
ADVFUNCS
DB2
DBCTL
MQSeries
MVS

TMON for DB2

CANCEL

031

DB2
subsystem

Controls the ability to cancel DB2
threads.

TMON for DBCTL

CBLKS

184

none

Controls the ability to display control
block data.

TMON for MVS

CCWTRACE

142

volume

Controls the ability to display I/O trace
data.

TMON for MQSeries CHANAUTH

124

MQSeries
object

Controls the ability to display channel
data.

TMON for CICS

CICSSTAT

113

none

Controls use of CICS address space
altering commands (for example,
BRINGIN, DONTSWAP, and FREEZE)
on the Job Selection List screen.

TMON for CICS
CNTLFILE
TMON for MQSeries
TMON for MVS

238
238
238

none
none
none

Controls access to a function that is
not supported in TMON for CICS,
TMON for MQSeries, or TMON for
MVS.

TMON for CICS
TMON for DBCTL

107
107

none
none

Controls access to Collection Analysis.

230
230
230
230
230

none
none
none
none
none

Controls access to the Console
Summary Display screen.

TMON
TMON
TMON
TMON
TMON

for
for
for
for
for

COLLANAL

CICS
CONSOLE
DB2
DBCTL
MQSeries
MVS

TMON for MVS

CSMON

099

none

Controls access to the Common
Storage Monitor screens.

TMON for MVS

CSMONDET

097

none

Controls access to the Common
Storage Detail screen.

2-24

Chapter 2: Security Definitions

Function Code Table

Product

Function

Code

Primary
Resource

TMON for MVS

CSMONOPT

098

none

Controls access to the Common
Storage Monitor Options screen.

TMON for DB2

CSTGSDSP

195

none

Controls access to the Database
Common Storage Summary screen.

CICS
DATADCTS
DB2
DBCTL
MQSeries
MVS

222
222
222
222
222

none
none
none
none
none

Controls access to data dictionary
screens.

TMON
TMON
TMON
TMON
TMON

for
for
for
for
for

Secondary
Resource
Description

TMON for DB2

DB2AUTH

010

DB2
subsystem

Controls the ability to monitor a
specific DB2 subsystem.

TMON for DB2

DB2CMD

032

DB2
subsystem

Controls the ability to issue DB2
commands. Currently, the only time a
DB2 command can be issued is when
the Current Thread Activity CANCEL
command is used on a DDF thread.
This command will generate the DB2
-CANCEL DDF THREAD command.

TMON for DB2

DB2CONN

033

DB2
subsystem

Controls the ability to use the CON,
DIS, and QUI commands outside of
the DB2 Monitoring Options screen.

TMON for DB2

DB2OPTS

170

TMON for DBCTL

DBCAUTH

010

Controls access to the DB2 Monitoring
Options screen.
none

Controls the ability to monitor a
specific DBCTL subsystem.

TMON for DBCTL

DBCCONN

033

none

Controls DBCTL connect.

TMON for DBCTL

DBCOPTS

170

none

Controls access to the DBCTL
Monitoring Options screen.

TMON for MVS

DLYGRP

071

none

Controls access to the Workload Delay
Definition List screen.

TMON for MVS

DLYGRPG

072

none

Controls access to global definitions
on the Workload Delay Definition List
screen.

TMON for MVS

DLYGRPU

073

job name

Controls access to user definitions on
the Workload Delay Definition List
screen.

TMON for MVS

DLYMNDET

074

job name

Controls access to the Delay Monitor
Detail screen.

TMON for MVS

DLYMON

070

none

Controls access to the Delay Monitor
Menu.

TMON for MQSeries DPAUTH

190

none

Controls access to the Dead Letter
Queue (DLQ) Processor.

TMON for DB2

DSNZPDSP

182

none

Controls access to the DB2
DSNZPARM/DSNHDECP Display
screen.

TMON for DB2

EDMSTAT

054

DB2
subsystem

Controls access to EDM pool statistics.

TMON for DB2
EXCPDEF
TMON for MQSeries

072
130

none
none

Controls the ability to define, activate,
and deactivate exceptions.

The Monitor for MVS 2.0
System Administrator’s Guide

2-25

Function Code Table

Chapter 2: Security Definitions

Code

Primary
Resource

TMON for MQSeries EXCPTDEF
TMON for MVS

154
130

none
none

For TMON for MQSeries, controls the
ability to add and update exceptions.
For TMON for MVS, controls access to
the Exception Definition Menu.

TMON for DB2
TMON for DBCTL

EXCPVIEW

073
073

none
none

Controls the ability to view the
Exception Monitor screens.

TMON for DB2

EXPLAIN

210

DB2
subsystem

Controls access to the DB2 EXPLAIN
Utility.

TMON for CICS

FLDBANAL

108

none

Controls access to Resource Analysis.

TMON for MVS

GDCOPTS

079

none

Controls access to data collection
options.

235
235
235
235
235

none
none
none
none
none

Controls access to the Help Definitions
Menu.

140

none

Controls access to History Analysis
functions.

Product

TMON
TMON
TMON
TMON
TMON

for
for
for
for
for

Function

CICS
HELPMENU
DB2
DBCTL
MQSeries
MVS

TMON for DB2

HISTANL

Secondary
Resource
Description

TMON
TMON
TMON
TMON
TMON

for
for
for
for
for

CICS
HLPFLDIR
DB2
DBCTL
MQSeries
MVS

236
236
236
236
236

none
none
none
none
none

Controls access to the Field-Level
Help Directory screen.

TMON
TMON
TMON
TMON
TMON

for
for
for
for
for

CICS
HLPFLDTL
DB2
DBCTL
MQSeries
MVS

237
237
237
237
237

none
none
none
none
none

Controls access to the Field-Level and
Message-Level Help Detail screens.

TMON
TMON
TMON
TMON
TMON

for
for
for
for
for

CICS
HLPMSDIR
DB2
DBCTL
MQSeries
MVS

253
253
253
253
253

none
none
none
none
none

Controls access to the Message-Level
Help Directory screen.

TMON
TMON
TMON
TMON
TMON

for
for
for
for
for

CICS
HLPSLDIR
DB2
DBCTL
MQSeries
MVS

205
205
205
205
205

none
none
none
none
none

Controls access to the Screen-Level
Help Directory screen.

TMON
TMON
TMON
TMON
TMON

for
for
for
for
for

CICS
HLPSLDTL
DB2
DBCTL
MQSeries
MVS

206
206
206
206
206

none
none
none
none
none

Controls access to the Screen-Level
Help Detail screen.

TMON for MVS

IODVHIST

140

none

Controls access to the Device Activity
History Screen.

TMON for MVS

IOMON

143

none

Controls access to the I/O Monitor
Menu options.

TMON for MVS

IOPSTART

141

none

Controls the ability to start I/O profiles.

TMON for DBCTL

ITASKANL

181

none

Controls the ability to access the
ITASK Analysis screens.

TMON for CICS

JOBLIST

101

job name

Controls access to the Job Selection
List screen.

2-26

Chapter 2: Security Definitions

Function Code Table

Code

Primary
Resource

TMON for DB2
JOBSUMM
TMON for DBCTL
TMON for MQSeries

196
196
196

none
none
none

Controls access to the Active Job
Summary screen.

TMON for CICS
LOGOSCRN
TMON for MQSeries
TMON for MVS

004
004
004

none
none
none

Controls access to the sign-on screen;
TMON for CICS/ESA does not support
this function.

TMON for MVS

MDFPRSM

176

none

Controls access to the Domain and
LPAR Summary screens.

TMON for DBCTL

MODSTOR

182

none

Controls the ability to modify DBCTL
storage.

TMON for DB2
MONCNTL
TMON for MQSeries

160
160

none
none

Controls access to Monitor Controls.

TMON for DB2
MONINIT
TMON for DBCTL
TMON for MQSeries

163
163
163

none
none
none

Controls the ability to access Monitor
Initialization options.

TMON for MQSeries MSGAUTH

125

MQSeries
object

Controls access to message functions.

TMON for CICS

MVSCONTN

105

none

Controls access to the MVS
Contention Monitor.

TMON for MQSeries NAMLAUTH

159

MQSeries
object

Controls command functions for
namelists.

TMON for DB2

090

none

Controls access to Online Analysis.

217
217
217
217
217

none
none
none
none
none

Controls access to storage in another
address space (OPENMAIN=asid);
TMON for DB2 does not support this
function.

Product

TMON
TMON
TMON
TMON
TMON

for
for
for
for
for

Function

ONLINANL

CICS
OPENMAIN
DB2
DBCTL
MQSeries
MVS

Secondary
Resource
Description

TMON for CICS

PASSTHRU

110

none

Controls access to Pass-Through
Sessions.

TMON for CICS

PERFORM

103

none

Controls access to the Performance
Monitor.

250
250
250
250
250

none
none
none
none
none

Controls access to the Function Key
Definitions screen.

TMON
TMON
TMON
TMON
TMON

for
for
for
for
for

CICS
PFKDEF
DB2
DBCTL
MQSeries
MVS

TMON for DB2
TMON for DBCTL

PFKEYS

233
233

none
none

Controls the ability to update function
key assignments.

TMON for DB2

PGSETDSP

101

DB2
subsystem

Controls access to the Page Set
Activity Summary screen.

TMON for DB2

PLANSUMM

212

DB2
subsystem

TMON for CICS

PROBALRT

104

none

Controls access to the Problem/Alert
Monitor.

TMON for MQSeries PROCAUTH

122

MQSeries
object

Controls access to process group
functions.

TMON for DBCTL

PRODPSWD

202

none

Controls product password entry.

TMON for CICS

PRODPSWG

201

none

Controls access to a function that
TMON for CICS/ESA does not support.

The Monitor for MVS 2.0
System Administrator’s Guide

DB2 plan
name

Controls access to user plans and
packages.

2-27

Function Code Table

Chapter 2: Security Definitions

Code

Primary
Resource

246
246
246
246
246

none
none
none
none
none

Controls access to the Detail Profile
Definition screen.

TMON for MQSeries PRTAUTOF
TMON for MVS

093
093

none
none

Controls the ability to use the
PRINTOFF command.

TMON for MQSeries PRTAUTON
TMON for MVS

092
092

none
none

Controls the ability to use the
PRINTON command.

TMON for MQSeries PRTCLOSE
TMON for MVS

091
091

none
none

Controls the ability to use the
CLOSEPRINT command.

TMON for MQSeries PRTCMD
TMON for MVS

090
090

none
none

Controls the ability to use the PRINT
command.

TMON for MQSeries PRTDFDSN
TMON for MVS

081
081

none
none

Controls access to the Define Print
Screen Dataset screen.

TMON for MQSeries PRTDFSYS
TMON for MVS

082
082

none
none

Controls access to the Define Print
Screen SYSOUT screen.

TMON for MQSeries PRTDFVTM
TMON for MVS

083
083

none
none

Controls access to a function not
supported by TMON for MQSeries or
TMON for MVS.

TMON for MQSeries PRTMENU
TMON for MVS

080
080

none
none

Controls access to the Print Screen
Definition Menu.

TMON for MQSeries PRTSTART
TMON for MVS

095
095

none
none

Controls the ability to use the
STARTPRINT command.

TMON for MQSeries PRTSTOP
TMON for MVS

094
094

none
none

Controls the ability to use the
STOPPRINT command.

TMON for DBCTL

065

none

Controls access to PSB tracking
functions.

TMON for MQSeries QAUTH

121

MQSeries
object

Controls access to queue functions.

TMON for MQSeries QMGRAUTH

120

MQSeries
object

Controls access to queue manager
functions.

TMON for MQSeries QMGREVNT

135

none

Controls access to the Queue
Manager Events screen.

TMON for MQSeries QMGROPTS

170

none

Controls the ability to update the
queue manager monitoring options.

TMON for MQSeries QMGRSEC

157

MQSeries
object

Controls command functions for queue
manager security.

TMON for DB2
TMON for DBCTL

RESRCDSP

190
190

none
none

Controls access to the DB2 and
DBCTL Resource Usage screens.

Product
TMON
TMON
TMON
TMON
TMON

for
for
for
for
for

Function
CICS
PROFDTL
DB2
DBCTL
MQSeries
MVS

PSBACTRK

Secondary
Resource
Description

TMON
TMON
TMON
TMON
TMON

for
for
for
for
for

CICS
RMTPTDEF
DB2
DBCTL
MQSeries
MVS

209
209
209
209
209

none
none
none
none
none

Controls access to the Remote
Sessions Directory and Remote
Session Definition screens.

TMON
TMON
TMON
TMON
TMON

for
for
for
for
for

CICS
RMTPTSEL
DB2
DBCTL
MQSeries
MVS

207
207
207
207
207

none
none
none
none
none

For TMON for CICS, controls access
to Pass Through to Other Landmark
Products. For TMON for DB2, TMON
for DBCTL, TMON for MQSeries, and
TMON for MVS, controls access to the
Remote Sessions Logon screen.

2-28

Chapter 2: Security Definitions

Function Code Table

Product

Function

Code

Primary
Resource

Secondary
Resource
Description

TMON for DBCTL

RSR

055

none

Controls access to remote site
recovery functions.

TMON for DB2

SAVESQL

216

none

Controls the ability to export SQL data
from the DB2 EXPLAIN Utility to a
sequential or partitioned data set.

TMON
TMON
TMON
TMON
TMON

for
for
for
for
for

CICS
SECFUNCS
DB2
DBCTL
MQSeries
MVS

243
243
243
243
243

none
none
none
none
none

Controls access to the Secured
Functions Directory screen.

TMON
TMON
TMON
TMON
TMON

for
for
for
for
for

CICS
SECFUNDF
DB2
DBCTL
MQSeries
MVS

245
245
245
245
245

none
none
none
none
none

Controls access to the Secured
Function Definition screen.

TMON
TMON
TMON
TMON
TMON

for
for
for
for
for

CICS
SECURITY
DB2
DBCTL
MQSeries
MVS

240
240
240
240
240

none
none
none
none
none

Controls access to security definitions.

TMON for DB2
TMON for DBCTL

SELUSRID

006
006

none
none

In TMON for DB2, controls the ability
to activate a set created by a user with
a different user ID or to update the
user ID assigned to a set. In TMON
for DBCTL, controls access to the
USERID= option.

TMON for DB2

SETAUTH

012

none

Controls the ability to update or delete
sets that do not match the signed on
user ID.

TMON for DB2

SHDWFRSH

044

DB2
subsystem

Controls the ability to issue the
SHADOWREFRESH command.

TMON
TMON
TMON
TMON

for
for
for
for

DB2
SHIFTDEF
DBCTL
MQSeries
MVS

175
175
175
177

none
none
none
none

Controls access to shift definitions.

TMON
TMON
TMON
TMON
TMON

for
for
for
for
for

CICS
SHUTDOWN
DB2
DBCTL
MQSeries
MVS

003
002
002
003
003

none
none
none
none
none

Controls use of the SHUTDOWN
command.

TMON
TMON
TMON
TMON
TMON

for
for
for
for
for

CICS
SIGNON
DB2
DBCTL
MQSeries
MVS

001
001
001
001
001

none
none
none
none
none

Controls the ability to log onto the
product.

TMON for DB2

SQLCCPA

041

DB2
subsystem

Controls the ability to access the SQL
Capture Collection Profile Summary
screen and start/stop dynamic SQL
Capture profiles from the Current
Thread Summary (Short and Long)
screens.

TMON for DB2

SQLCGDF

042

DB2
subsystem

Controls the ability to access the SQL
Capture Collection Controls screen.

The Monitor for MVS 2.0
System Administrator’s Guide

2-29

Function Code Table

Chapter 2: Security Definitions

Primary
Resource

Secondary
Resource
Description

040

DB2
subsystem

DB2 plan
name

TMON for MQSeries STGCAUTH

123

job name

Controls access to storage class
functions.

TMON for DBCTL

STGPOOLS

210

none

Controls access to storage class
functions.

TMON for CICS

STORANAL

106

none

Controls access to the Storage
Analysis menu.

TMON for CICS
TMON for MVS

STORTCBS

221
221

none
none

Controls access to the Address Space
TCB Map screen.

TMON for CICS
TMON for MVS

STORTIOT

220
220

none
none

Controls access to the TIOT Display
screen.

Product

Function

Code

TMON for DB2

SQLTEXT

Controls access to the Current Thread
SQL Text Detail screen only if the
thread is executing a specified plan
within a specified DB2 subsystem.

TMON
TMON
TMON
TMON
TMON

for
for
for
for
for

CICS
STRGALTR
DB2
DBCTL
MQSeries
MVS

211
211
211
211
211

none
none
none
none
none

Controls the ability to alter storage.

TMON
TMON
TMON
TMON
TMON

for
for
for
for
for

CICS
STRGDSPY
DB2
DBCTL
MQSeries
MVS

137
137
137
137
137

none
none
none
none
none

Controls the ability to display storage
in any format.

TMON
TMON
TMON
TMON
TMON

for
for
for
for
for

CICS
STRGNPRV
DB2
DBCTL
MQSeries
MVS

115
115
115
115
115

none
none
none
none
none

Controls the ability to alter and display
nonprivate storage.

TMON
TMON
TMON
TMON
TMON

for
for
for
for
for

CICS
STRGPRV
DB2
DBCTL
MQSeries
MVS

116
116
116
116
116

none
none
none
job name
job name

Controls the ability to alter and display
private storage.

TMON for DB2

STUNLOAD

118

none

Controls the ability to unload trace
data to a sequential data set in SMF
format.

TMON for DB2

SUPERTDM

111

DB2
subsystem

Controls the ability to view collected
trace data.

TMON for CICS
TMON for DB2

SUPERTRC

109
110

none
none

Controls access to Supertrace.

TMON for DB2

SUPERTSD

112

DB2
subsystem

Controls the ability to start Supertraces.

TMON for MVS

SVCDUPD

180

none

Controls the ability to customize the
description of an SVC table.

TMON for MVS

SYSADM

178

none

Controls access to the System
Administration menu.

TMON for CICS

SYSADMIN

111

none

Controls access to System
Administration screens.

TMON for CICS

TASKCANC

118

none

Controls the ability to cancel a task
when using the Activity Monitor.

2-30

Chapter 2: Security Definitions

Function Code Table

Code

Primary
Resource

TMON for MQSeries THRDAUTH

156

job name

Controls command functions for
threads.

TMON
TMON
TMON
TMON
TMON

for
for
for
for
for

CICS
USERCMDS
DB2
DBCTL
MQSeries
MVS

208
208
208
208
208

none
none
none
none
none

Controls access to the User Command
Definitions screen.

TMON
TMON
TMON
TMON
TMON

for
for
for
for
for

CICS
USERDEF
DB2
DBCTL
MQSeries
MVS

242
242
242
242
242

none
none
none
none
none

Controls access to the User Definition
screen.

TMON
TMON
TMON
TMON
TMON

for
for
for
for
for

CICS
USERDIR
DB2
DBCTL
MQSeries
MVS

241
241
241
241
241

none
none
none
none
none

Controls access to the User Profiles
Directory screen.

TMON
TMON
TMON
TMON
TMON

for
for
for
for
for

CICS
USERPROF
DB2
DBCTL
MQSeries
MVS

244
244
244
244
244

none
none
none
none
none

Controls access to the
Profiles/Resources Directory screen.

Product

Function

Secondary
Resource
Description

TMON for MVS

UTILAPFL

155

none

Controls access to the APF Utility
screen.

TMON for MVS

UTILASMB

169

none

Controls access to the ASM Control
Blocks screen.

TMON for MVS

UTILDASD

153

none

Controls access to the DASD and
Tape Services Menu.

TMON for MVS

UTILDDSL

158

none

Controls access to the System Dump
Data Set Display screen
(SYS.DUMPnn data sets).

TMON for MVS

UTILDSNI

175

none

Controls access to the Data Set
Information Display screen.

TMON for MVS

UTILDSNU

174

none

Controls access to the Data Set Name
Utility.

TMON for MVS

UTILFSPC

159

none

Controls access to the FSPACE Utility.

TMON for MVS

UTILIOSB

170

none

Controls access to the IOS Control
Blocks screen.

TMON for MVS

UTILJOBB

171

none

Controls access to the Job Control
Blocks screen.

TMON for MVS

UTILJOBS

154

none

Controls access to the Job-Related
Services Menu.

TMON for MVS

UTILJPGN

165

job name

Controls access to the Performance
Group Utility.

TMON for MVS

UTILJTRM

164

job name

Controls access to the Job
Termination Utility and the TCB KILL
function of the CDE Detail Display
screen.

TMON for MVS

UTILLNKL

157

none

Controls access to the LNKLST Utility.

TMON for MVS

UTILLPAL

156

none

Controls access to the LPA/Nucleus
Utility screen.

TMON for MVS

UTILMENU

150

none

Controls access to the Utilities Menu.

The Monitor for MVS 2.0
System Administrator’s Guide

2-31

Function Code Table

Chapter 2: Security Definitions

Product

Function

Code

Primary
Resource

TMON for DB2
TMON for DBCTL

UTILMON

051
051

none
none

Controls access to the Current System
Statistics menu.

TMON for MVS

UTILMSTG

152

none

Controls access to the MVS Storage
Displays Menu.

TMON for MVS

UTILMVSB

166

none

Controls display of the MVS Control
Blocks screen.

TMON for MVS

UTILSRMB

167

none

Controls access to the SRM Control
Blocks screen.

TMON for MVS

UTILSSVC

151

none

Controls access to the Systems
Services Menu.

TMON for MVS

UTILSWAP

163

none

Controls access to the Swap Status
Utility.

TMON for MVS

UTILVMNT

162

none

Controls access to the Volume Mount
Utility.

TMON for MVS

UTILVOLU

173

none

Controls access to the Volume Use
Utility.

TMON for MVS

UTILVSMB

168

none

Controls access to the VSM Control
Blocks screen.

TMON for MVS

WKLDDEF

179

none

Controls access to workload definitions.

TMON for DB2

WRKBENCH

095

none

Controls entry into the Analytic
Workbench.

TMON for MVS

XCFMON

096

none

Controls access to the XCF Activity
Selection Menu options.

2-32

Secondary
Resource
Description

Chapter 2: Security Definitions

Profiles/Resources Directory

Profiles/Resources Directory
JOBNAME:
SYSID :

THE MONITOR FOR MVS
VERSION: 2.0
PROFILES/RESOURCES DIRECTORY

DATE:
TIME:

COMMAND:
TO "CHANGE" OR "DELETE" : CURSOR SELECT USER ID OR PROFILE ID.
TO "ADD" : CURSOR SELECT ANY USER ID OR PROFILE ID.
PROFILE ID
PRIMARY RESOURCE
SECONDARY RESOURCE
$DBADMIN
*
*
$DEFAULT
*
*
$SECURTY
*
*
$SYSADMN
*
*
$SYSPROG
*
*
$SYSYUNG
*
*
$SYSYUN1
*
*

HELP INFORMATION = PF1

PF KEY ASSIGNMENTS = PA1

The Profiles/Resources Directory screen lists security profile
definitions in the control file.
Security definitions for resource functions (functions that can be
limited by primary and secondary resources) may vary depending
upon the access levels set for those functions with the individual
resource.
TMON for MVS example

You might use a profile to let users use the Performance Group
Utility for job names beginning with the letters “DB”, but restrict
users from using the Performance Group Utility for job names
beginning with the letters “DV”.
The security definitions given with the first resource listed are used
to secure system functions (functions that do not use resources).
Resources always are sorted, displayed, and used alphabetically.
For example, if a profile called SAMPLE displays two primary
resources, DEV* and TEST*, the DEV* resource is listed first, and its
security definitions for system functions are used first. The
security definitions of system functions for the TEST* resource are
ignored.

Accessing this Screen

To access this screen, complete one of the following paths.

Product

Action

Displays

TMON for CICS/ESA

On the command line, enter
=10.1.7.3 .

Profiles/Resources Directory

TMON for CICS/MVS

On the command line, enter
=10.1.9.3 .

Profiles/Resources Directory

TMON for DB2

On the command line, enter =8.1.3.

Profiles/Resources Directory

The Monitor for MVS 2.0
System Administrator’s Guide

2-33

Profiles/Resources Directory

Chapter 2: Security Definitions

Product

Action

Displays

TMON for DBCTL

On the command line, enter =M.1.3.

Profiles/Resources Directory

TMON for MQSeries

On the command line, enter =8.1.3.

Profiles/Resources Directory

TMON for MVS

On the command line, enter =S.2.3.

Profiles/Resources Directory

If you access the Profile/Resources Directory screen as the third
option of the Security Definitions Menu, it displays resource
information for all existing security profile definitions in the
control file. If you access the screen from the User Definition or
User Profiles Directory screen, it displays only the resources for the
specific profile you selected.

Primary Commands

Fields

Use the DOWN and UP commands to scroll through this screen. To
learn about the various ways to scroll using these commands and
for syntax and descriptions of all commands, see Chapter 2 in your
product reference manual.

PRIMARY RESOURCE

Shows the name of the principal resource for the profile definition.
In addition to checking a user ID’s access level for a given function,
Landmark PerformanceWorks MVS products can limit a user ID’s
use of a function to a selected resource.

• TMON for CICS primary resources are job names.
• TMON for DB2 primary resources are DB2 subsystem names.
• TMON for DBCTL primary resources are DBCTL subsystem
names.

• TMON for MQSeries primary resources are MQSeries object
names.

• TMON for MVS primary resources are job names or volume
serial numbers.
An asterisk (*) in the field shows that pattern matching is being
used. For example, PROD* identifies all primary resources
beginning with the letters “PROD.” If you specify an asterisk
alone, all values of the primary resource are used.

➥ PROFILE ID
Displays the 1- to 8-character profile ID for the product.
Cursor-select this field to add, update, or delete profile definitions.
The Detail Profile Definition screen is displayed.
SECONDARY RESOURCE

Shows the name of the secondary resource for the profile definition.

2-34

Chapter 2: Security Definitions

TMON for CICS, TMON for
DBCTL, TMON for
MQSeries, and TMON for
MVS do not use secondary
resources.

Profiles/Resources Directory

TMON for DB2 secondary resources are DB2 plan or package
names. Secondary resources qualify security within the limits of
the primary resource. For example, you can restrict the user plans
that can be reviewed by DB2 subsystem name and by plan name
within DB2 subsystem using the PLANSUMM function. If you
restrict TMON for DB2 by secondary resources, you must first
specify a primary and secondary resource pair in the profile using
an asterisk (*) for the secondary resource. You then can specify a
second primary and secondary resource pair in the profile using
the transaction ID for the secondary resource. This step is
necessary because TMON for DB2 security needs to know what
default security to use for DB2 subsystem names that match the
primary resource but DB2 plan or package names that do not
match the secondary resource.
An asterisk (*) in the field shows that pattern matching is being
used. For example, PROD* identifies all secondary resources
beginning with the letters “PROD.” If you specify an asterisk
alone, all values of the secondary resource are used.

The Monitor for MVS 2.0
System Administrator’s Guide

2-35

Detail Profile Definition

Chapter 2: Security Definitions

Detail Profile Definition
JOBNAME:
SYSID :

THE MONITOR FOR MVS
VERSION: 2.0
DETAIL PROFILE DEFINITION

DATE:
TIME:

COMMAND:
PROFILE: $DEFAULT PRIMARY RESOURCE: *
CURSOR SELECT ONE OF THE FOLLOWING:
_ADD
DESCRIPTION
USER ACCESS AND SIGNON
SHUTDOWN COMMAND
LOGO SCREEN CONTROL
DELAY MONITOR MAIN MENU
DELAY MONITOR GROUP DEFINITION
DELAY MONITOR GLOBAL RECORDS
DELAY MONITOR USER RECORDS
DELAY MONITOR DETAIL ANALYSIS
DATA COLLECTION OPTIONS
PRINT SCREEN MENU
PRINT SCREEN DEFINE DSN OUTPUT
PRINT SCREEN DEFINE SYSOUT OUT

FUNCTION
SIGNON
SHUTDOWN
LOGOSCRN
DLYMON
DLYGRP
DLYGRPG
DLYGRPU
DLYMNDET
GDCOPTS
PRTMENU
PRTDFDSN
PRTDFSYS

HELP INFORMATION = PF1

SECONDARY RESOURCE: *
_UPDATE
_DELETE
<-LO--ACCESS LEVELS--HI->
CODE
NONE READ UPDT CNTL ALTR
001
X
003
X
004
X
070
X
071
X
072
X
073
X
074
X
079
X
080
X
081
X
082
X

PF KEY ASSIGNMENTS = PA1

The Detail Profile Definition screen lists detailed information for a
selected security profile. The detail profile definition consists of the
profile ID, the qualifying resources, function descriptions, function
names and codes, and access levels.
Changes to a profile take effect
the next time a user logs onto
the product and invokes the
profile.

If a profile lists multiple resources, the security definitions given
with the first resource listed are used to secure system functions for
the profile (functions that do not use primary or secondary
resources). If other primary resources are listed for this profile on
the Profiles/Resources Directory screen, the security definitions for
their system functions are ignored.

Caution

We recommend that you do not change the default security profiles
shipped with your Landmark PerformanceWorks MVS product. The
control file PDS member containing these profiles (V@RECS) may
be changed in the next release. When this member is copied into
your VSAM control file, all your changes to the default profiles will
be overlaid.

Accessing this Screen

To access this screen, complete one of the following paths.

Product

Action

Displays

TMON for CICS/ESA

On the command line, enter
=10.1.7.3 .

Profiles/Resources Directory

TMON for CICS/MVS

TMON for DB2

2-36

Cursor-select a profile definition.

Detail Profile Definition

On the command line, enter
=10.1.9.3 .

Profiles/Resources Directory

Cursor-select a profile definition.

Detail Profile Definition

On the command line, enter =8.1.3.

Profiles/Resources Directory

Cursor-select a profile definition.

Detail Profile Definition

Chapter 2: Security Definitions

Detail Profile Definition

Product

Action

Displays

TMON for DBCTL

On the command line, enter =M.1.3.

Profiles/Resources Directory

Cursor-select a profile definition.

Detail Profile Definition

TMON for MQSeries

On the command line, enter =8.1.3.

Profiles/Resources Directory

Cursor-select a profile definition.

Detail Profile Definition

TMON for MVS

On the command line, enter =S.2.3.

Profiles/Resources Directory

Cursor-select a profile definition.

Detail Profile Definition

Primary Commands

Enter the following commands on the command line.
ADD

Adds a profile definition to the control file.
Type over the appropriate fields
(LO-ACCESS LEVELS-HI, PRIMARY
RESOURCE, PROFILE, and SECONDARY
RESOURCE) to identify the profile
definition; then enter this command (or
cursor-select the ADD field).

DELETE

Deletes a profile definition from the control
file. You also can cursor-select the DELETE
field to perform this function.

UPDATE

Updates a profile definition in the control
file. Type over the information you want to
change; then enter this command (or
cursor-select the UPDATE field).

Use the DOWN and UP commands to scroll through this screen. To
learn about the various ways to scroll using these commands and
for syntax and descriptions of all commands, see Chapter 2 in your
product reference manual.

Fields

➥ ADD
Adds a profile definition to the control file. Type over the
appropriate fields (LO-ACCESS LEVELS-HI, PRIMARY
RESOURCE, PROFILE, and SECONDARY RESOURCE) to identify
the profile definition; then cursor-select this field to add the
definition to the control file. You also can use the ADD command
to perform this function.
CODE

Shows the 3-digit internal function ID. You cannot modify this
field.

➥

DELETE

Deletes a profile definition from the control file.
Cursor-select this field to delete the definition. You also can use
the DELETE command to perform this function.

The Monitor for MVS 2.0
System Administrator’s Guide

2-37

Detail Profile Definition

Chapter 2: Security Definitions

DESCRIPTION

Displays the 1- to 30-character description of the function. You
cannot change this field.
FUNCTION

Displays the 1- to 8-character name of the facility within the
product. You cannot change this field.
LO-ACCESS LEVELS-HI

Displays the level of access assigned this profile for each secured
function. Enter X under the access level appropriate for the
function and the profile. Access levels vary in meaning depending
on the function. Review the function access level table, later in this
chapter, to identify the minimum access level required for a specific
function and a description of the other access levels for that
function (if more than one access level applies). The following
table describes the five access levels, in order of increasing security
level.
Access Level

Description

NONE

The lowest security access level. An X (the default) in this
field denies the user access to the function.

READ

Defines READ access authorization. This is the fourth
highest level of secured access.

UPDT

Defines UPDATE access authorization. This is the third
highest level of secured access. Users with UPDT access
also have READ access to the function.

CNTL

Defines CONTROL access authorization. This is the
second highest level of secured access. Users with CNTL
access also have READ and UPDT access to the function.

ALTR

Defines ALTER access authorization. This is the highest
level of secured access. Users with ALTR access have
total access, including READ, UPDT, and CNTL access to
the function.

PRIMARY RESOURCE

Shows the name of the principal resource for this profile definition.
User IDs using this profile definition are in effect only for the
resource specified here.

• TMON for CICS primary resources are job names.
• TMON for DB2 primary resources are DB2 subsystem names.
• TMON for DBCTL primary resources are DBCTL subsystem
names.

• TMON for MQSeries primary resources are MQSeries object
names.

• TMON for MVS primary resources are job names or volume
serial numbers.
You can use an asterisk (*) to activate pattern matching for this
field. For example, PROD* identifies all primary resources

2-38

Chapter 2: Security Definitions

Detail Profile Definition

beginning with the characters “PROD.” If you specify an asterisk
alone, all values of the primary resource are used.
If you want to specify more primary resources than this screen
allows (even after using pattern matching), add other definitions
for the profile using the other primary resources. Only the access
levels specified for the first profile/resource definition are used in
security for system functions (functions that do not use resources),
but all of the different primary resources in the other definitions are
included in the security for resource functions.
TMON for MQSeries example

You can use the QMGRAUTH function to limit the queue managers
monitored by a given user ID. In this example, access levels are
defined for system functions based on the settings in the
$EXAMPLE profile with CSQ* resource. The access levels defined
for system functions in the $EXAMPLE profile with the CSQ*
resource are ignored. They are ignored because the CSQ* resource
is defined before the OTH* resource and, consequently, is
encountered first by Internal Security.
Profile ID

Primary Resource

$EXAMPLE

CSQ*
OTH*

PROFILE

Displays the 1- to 8-character product profile ID you selected on
the Profiles/Resources Directory screen. Change this ID if you
want to add a new profile definition.
SECONDARY RESOURCE

Shows the name of the auxiliary resource for this profile definition.
TMON for CICS, TMON for
DBCTL, TMON for
MQSeries, and TMON for
MVS do not use secondary
resources.

TMON for DB2 secondary resources are DB2 plan or package
names. If you restrict TMON for DB2 by secondary resources, you
must first specify a primary and secondary resource pair in the
profile using an asterisk (*) for the secondary resource. You then
can specify a second primary and secondary resource pair in the
profile using the transaction ID for the secondary resource. This
step is necessary because TMON for DB2 security needs to know
what default security to use for DB2 subsystem names that match
the primary resource but DB2 plan or package names that do not
match the secondary resource.
An asterisk (*) in the field shows that pattern matching is being
used. For example, PROD* identifies all secondary resources
beginning with the letters “PROD.” If you specify an asterisk
alone, all values of the secondary resource are used.
If you want to specify more secondary resources than this screen
allows (even after using pattern matching), add other definitions
for the profile using the same primary resource and other
secondary resources. Only the access levels specified for the first
profile/primary resource/secondary resource definition are used in
security for system functions, but all of the defined secondary

The Monitor for MVS 2.0
System Administrator’s Guide

2-39

Detail Profile Definition

Chapter 2: Security Definitions

resources are included in the security for resource functions. For
example, you can restrict the user plans that can be reviewed by
DB2 subsystem name and plan name within DB2 subsystem using
the PLANSUMM function.

➥

UPDATE

Updates a profile definition in the control file. Type over the
information you want to change; then cursor-select this field to
update the definition in the control file. You also can use the
UPDATE command to perform this function.

2-40

Chapter 2: Security Definitions

Function Access Level Table

Function Access Level Table
This section shows the minimum access level required to use each
product function within your Landmark PerformanceWorks MVS
product.
If more than one access level is indicated for a function (in other
words, if more than one access level column has an X in it), the
various access levels provide access to different aspects of the
function. Read the description in the Notes column to determine
which access level you need.
If READ access is the only access level shown for a function, the
function has only two levels of authorization: access or no access.
In other words, the READ, UPDT, CNTL, and ALTR access levels
all provide access to the function with no distinction between
them; the NONE access level restricts use of the function. For
example, the READ, UPDT, CNTL, and ALTR access levels all have
the same meaning for the HELPMENU function: They allow access
to the Help Definitions Menu.
Likewise, if a function shows a blank in an access level column,
that access level has the same meaning as the previous access
column with an X in it. For example, the CNTL and ALTR access
levels for the CONSOLE function have the same meaning as the
UPDT function: They allow access to view the console displays,
and they allow commands to be entered on the displays. The
READ access level of the CONSOLE function, however, only allows
access to view the console displays.
To deny access to any function, specify an access level of NONE (or
“N”). The following abbreviations are used in the table:
A

ALTR access authorization

C

CNTL access authorization

N No security

TMON for CICS

R

READ access authorization

U

UPDT access authorization

The following table shows the minimum access level required to use
each product function for TMON for CICS.
Minimum Level Required

Function

Code

N

R

ACTIVMON

102

X

ADVFUNCS

180

X

CICSSTAT

113

CNTLFILE

238

X

COLLANAL

107

X

The Monitor for MVS 2.0
System Administrator’s Guide

U

C

A

Notes

X

2-41

Function Access Level Table

Chapter 2: Security Definitions

Minimum Level Required

2-42

Function

Code

CONSOLE

N

U

230

X

X

READ (or higher) lets users view
console displays. UPDT (or higher)
is required to enter commands on
console displays.

DATADCTS

222

X

FLDBANAL

108

X

HELPMENU

235

X

HLPFLDIR

236

X

HLPFLDTL

237

X

HLPMSDIR

253

X

HLPSLDIR

205

X

HLPSLDTL

206

X

JOBLIST

101

X

X

Because the JOBLIST function uses
the JOBNAME field as a resource
ID, you may have NONE, READ, or
UPDT access by job name. READ
(or higher) lets users select the job
from the Job Selection List screen.
Functions that are capable of
changing the state of the CICS
region (such as starting Supertrace)
may require UPDT access.

LOGOSCRN

004

X

MVSCONTN

105

X

OPENMAIN

217

X

PASSTHRU

110

X

PERFORM

103

X

PFKDEF

250

X

PROBALRT

104

X

PRODPSWG

201

X

PROFDTL

246

X

RMTPTDEF

209

X

RMTPTSEL

207

X

SECFUNCS

243

X

SECFUNDF

245

X

C

A

Notes

R

X

X

READ (or higher) lets users view
function key settings. UPDT (or
higher) lets users change function
key settings for their user ID. ALTR
lets users change function key
settings for any user ID.

X

X

READ (or higher) lets users view
the remote session definitions.
UPDT (or higher) lets users change
remote session definitions and the
SLU session ID prefix. ALTR lets
users add and delete remote
session definitions.

Chapter 2: Security Definitions

Function Access Level Table

Minimum Level Required
Function

Code

SECURITY

C

A

Notes

R

U

240

X

X

SHUTDOWN

003

X

SIGNON

001

X

STORANAL

106

X

STORTCBS

221

X

STORTIOT

220

X

STRGALTR

211

X

Works with the STRGNPRV and
STRGPRV functions. To alter
private storage, READ access must
be specified for STRGALTR and
UPDT must be specified for
STRGPRV. To alter nonprivate
storage, READ access must be
specified for STRGALTR and UPDT
must be specified for both
STRGPRV and STRGNPRV.

STRGDSPY

137

X

Works with the STRGNPRV and
STRGPRV functions. To display
private storage, READ access must
be specified for both STRGDSPY
and STRGPRV. To display
nonprivate storage, READ access
must be specified for both
STRGDSPY and STRGNPRV.

STRGNPRV

115

X

X

Works with the STRGDSPY,
STRGALTR, and STRGPRV
functions. To alter nonprivate
storage, you must be authorized to
alter private and nonprivate
storage. See the above notes for
the STRGDSPY and STRGALTR
functions for the authorization
required to display and alter
nonprivate storage.

STRGPRV

116

X

X

Works with the STRGDSPY and
STRGALTR functions. See the
above notes on these functions for
the authorization required to display
and alter private storage.

SUPERTRC

109

X

X

READ (or higher) lets users view
Supertrace data. To start
Supertrace collection for the
selected job(s), UPDT (or higher)
must be specified for the JOBLIST
function.

SYSADMIN

111

X

X

UPDT (or higher) is required to
update data collection options in the
System Administration option.

TASKCANC

118

The Monitor for MVS 2.0
System Administrator’s Guide

N

READ (or higher) lets users access
the Security Definitions Menu.
UPDT (or higher) is required to
change the type of logon and
function security used.

X

2-43

Function Access Level Table

Chapter 2: Security Definitions

Minimum Level Required
Function

Code

USERCMDS

USERDEF

N

R

U

208

X

X

242

X

X

USERDIR

241

X

USERPROF

244

X

TMON for DB2

C

A

Notes
READ (or higher) lets users view
user command definitions. UPDT
(or higher) lets users add and
modify user command definitions.

X

READ (or higher) lets users view
their own user ID definitions and
passwords. UPDT (or higher) lets
users review and update their own
user ID definitions and passwords.
ALTR lets users review and update
any user ID definition and password.

The following table shows the minimum access level required to use
each product function for TMON for DB2.
Minimum Level Required

2-44

Function

Code

ACTVLOG

053

X

ACTVMON

030

X

ADVFUNCS

180

X

CANCEL

031

X

CONSOLE

230

X

N

R

CSTGSDSP

195

X

DATADCTS

222

X

DB2AUTH

010

X

DB2CMD

032

X

DB2CONN

033

X

DB2OPTS

170

X

DSNZPDSP

182

X

EDMSTAT

054

X

EXCPDEF

072

X

EXCPVIEW

073

X

EXPLAIN

210

X

HELPMENU

235

X

HISTANL

140

X

HLPFLDIR

236

X

HLPFLDTL

237

X

HLPMSDIR

253

X

HLPSLDIR

205

X

HLPSLDTL

206

X

U

X

C

A

Notes

READ (or higher) lets users view
console displays. UPDT (or higher)
is required to enter commands on
console displays.

Chapter 2: Security Definitions

Function Access Level Table

Minimum Level Required
Function

Code

JOBSUMM

196

X

MONCNTL

160

X

N

R

MONINIT

163

X

ONLINANL

090

X

OPENMAIN

217

X

PFKDEF

250

X

PFKEYS

233

X

PGSETDSP

101

X

PLANSUMM

212

X

PROFDTL

246

X

RESRCDSP

190

X

RMTPTDEF

209

X

RMTPTSEL

207

X

SAVESQL

216

X

SECFUNCS

243

X

SECFUNDF

245

X

SECURITY

240

X

SELUSRID

006

X

SETAUTH

012

X

SHDWFRSH

044

X

SHIFTDEF

175

X

SHUTDOWN

002

X

SIGNON

001

X

SQLCCPA

041

X

SQLCGDF

042

X

SQLTEXT

040

X

The Monitor for MVS 2.0
System Administrator’s Guide

A

Notes

X

X

READ (or higher) lets users view
function key settings. UPDT (or
higher) lets users change function
key settings for their user ID. ALTR
lets users change function key
settings for any user ID.

X

X

READ (or higher) lets users view
the remote session definitions.
UPDT (or higher) lets users change
remote session definitions and the
SLU session ID prefix. ALTR lets
users add and delete remote
session definitions.

U

X

C

READ (or higher) lets users access
the Security Definitions Menu.
UPDT (or higher) is required to
change the type of logon and
function security used.

2-45

Function Access Level Table

Chapter 2: Security Definitions

Minimum Level Required

2-46

Function

Code

STRGALTR

211

X

Works with the STRGNPRV and
STRGPRV functions. To alter
private storage, READ access must
be specified for STRGALTR and
UPDT must be specified for
STRGPRV. To alter nonprivate
storage, READ access must be
specified for STRGALTR and UPDT
must be specified for both
STRGPRV and STRGNPRV.

STRGDSPY

137

X

Works with the STRGNPRV and
STRGPRV functions. To display
private storage, READ access must
be specified for both STRGDSPY
and STRGPRV. To display
nonprivate storage, READ access
must be specified for both
STRGDSPY and STRGNPRV.

STRGNPRV

115

X

X

Works with the STRGDSPY,
STRGALTR, and STRGPRV
functions. To alter nonprivate
storage, you must be authorized to
alter private and nonprivate
storage. See the above notes for
the STRGDSPY and STRGALTR
functions for the authorization
required to display and alter
nonprivate storage.

STRGPRV

116

X

X

Works with the STRGDSPY and
STRGALTR functions. See the
above notes on these functions for
the authorization required to display
and alter private storage.

STUNLOAD

118

X

SUPERTDM

111

SUPERTRC

110

N

R

U

C

A

Notes

X
X

SUPERTSD

112

USERCMDS

208

X

X

X

USERDEF

242

X

X

USERDIR

241

X

USERPROF

244

X

UTILMON

051

X

WRKBENCH

095

X

READ (or higher) lets users view
user command definitions. UPDT
(or higher) lets users add and
modify user command definitions.
X

READ (or higher) lets users view
their own user ID definitions and
passwords. UPDT (or higher) lets
users review and update their own
user ID definitions and passwords.
ALTR lets users review and update
any user ID definition and password.

Chapter 2: Security Definitions

TMON for DBCTL

Function Access Level Table

The following table shows the minimum access level required to use
each product function for TMON for DBCTL.
Minimum Level Required

Function

Code

ACTVMON

030

X

ADVFUNCS

180

X

CBLKS

184

X

N

R

COLLANAL

107

X

CONSOLE

230

X

DATADCTS

222

X

DBADMIN

110

X

DBCAUTH

010

X

DBCCONN

033

X

DBCOPTS

170

X

EXCPDEF

072

X

EXCPVIEW

073

X

HELPMENU

235

X

HLPFLDIR

236

X

HLPFLDTL

237

X

HLPMSDIR

253

X

HLPSLDIR

205

X

HLPSLDTL

206

X

ITASKANL

181

X

JOBSUMM

196

X

MODSTOR

182

X

MONCNTL

160

X

MONINIT

163

X

OPENMAIN

217

X

PFKDEF

250

X

PFKEYS

233

X

PRODPSWD

202

X

PROFDTL

246

X

PSBACTRK

065

X

RESRCDESP

190

X

The Monitor for MVS 2.0
System Administrator’s Guide

U

C

A

X

X

Notes

READ (or higher) lets users view
console displays. UPDT (or higher)
is required to enter commands on
console displays.

X

READ (or higher) lets users view
function key settings. UPDT (or
higher) lets users change function
key settings for their user ID. ALTR
lets users change function key
settings for any user ID.

2-47

Function Access Level Table

Chapter 2: Security Definitions

Minimum Level Required

2-48

Function

Code

RMTPTDEF

N

R

U

209

X

X

RMTPTSEL

207

X

RSR

055

X

SECFUNCS

243

X

SECFUNDF

245

X

SECURITY

240

X

X

C

A

Notes

X

READ (or higher) lets users view
the remote session definitions.
UPDT (or higher) lets users change
remote session definitions and the
SLU session ID prefix. ALTR lets
users add and delete remote
session definitions.

READ (or higher) lets users access
the Security Definitions Menu.
UPDT (or higher) is required to
change the type of logon and
function security used.

SELUSRID

006

X

SHIFTDEF

175

X

SHUTDOWN

002

X

SIGNON

001

X

STGPOOLS

210

X

STRGALTR

211

X

Works with the STRGNPRV and
STRGPRV functions. To alter
private storage, READ access must
be specified for STRGALTR and
UPDT must be specified for
STRGPRV. To alter nonprivate
storage, READ access must be
specified for STRGALTR and UPDT
must be specified for both
STRGPRV and STRGNPRV.

STRGDSPY

218

X

Works with the STRGNPRV and
STRGPRV functions. To display
private storage, READ access must
be specified for both STRGDSPY
and STRGPRV. To display
nonprivate storage, READ access
must be specified for both
STRGDSPY and STRGNPRV.

STRGNPRV

115

X

X

Works with the STRGDSPY,
STRGALTR, and STRGPRV
functions. To alter nonprivate
storage, you must be authorized to
alter private and nonprivate
storage. See the above notes for
the STRGDSPY and STRGALTR
functions for the authorization
required to display and alter
nonprivate storage.

STRGPRV

116

X

X

Works with the STRGDSPY and
STRGALTR functions. See the
above notes on these functions for
the authorization required to display
and alter private storage.

Chapter 2: Security Definitions

Function Access Level Table

Minimum Level Required
Function

Code

USERCMDS

208

N

R

U

X

X

USERDEF

242

X

USERDIR

241

X

USERPROF

244

X

UTILMON

051

X

TMON for MQSeries

C

A

Notes
READ (or higher) lets users view
user command definitions. UPDT
(or higher) lets users add and
modify user command definitions.

X

The following table shows the minimum access level required to use
each product function for TMON for MQSeries.
Minimum Level Required

Function

Code

ADVFUNCS

203

X

CHANAUTH

124

X

N

R

CNTLFILE

238

X

CONSOLE

230

X

DATADCTS

222

X

DPAUTH

190

X

EXCPDEF

130

X

EXCPTDEF

154

X

HELPMENU

235

X

HLPFLDIR

236

X

HLPFLDTL

237

X

HLPMSDIR

253

X

HLPSLDIR

205

X

HLPSLDTL

206

X

JOBSUMM

196

X

LOGOSCRN

004

X

MONCNTL

160

X

MONINIT

163

X

MSGAUTH

125

X

NAMLAUTH

159

X

OPENMAIN

217

X

The Monitor for MVS 2.0
System Administrator’s Guide

U

C

A

Notes

X

READ (or higher) lets users view
console displays. UPDT (or higher)
is required to enter commands on
console displays.

X

READ (or higher) lets users view
exception definitions. UPDT (or
higher) is required to update
exception definitions.

2-49

Function Access Level Table

Chapter 2: Security Definitions

Minimum Level Required

2-50

Function

Code

PFKDEF

N

R

U

250

X

X

PROCAUTH

122

X

PRODPSWD

202

X

PROFDTL

246

X

PRTAUTOF

093

X

PRTAUTON

092

X

C

A

Notes

X

READ (or higher) lets users view
function key settings. UPDT (or
higher) lets users change function
key settings for their user ID. ALTR
lets users change function key
settings for any user ID.

PRTCLOSE

091

X

PRTCMD

090

X

PRTDFDSN

081

X

X

READ (or higher) lets users view
print screen data set name
definitions. UPDT (or higher) is
required to update print screen
SYSOUT definitions.

PRTDFSYS

082

X

X

READ (or higher) lets users view
print screen data set name
definitions. UPDT (or higher) is
required to update print screen
SYSOUT definitions.

PRTDFVTM

083

X

PRTMENU

080

X

PRTSTART

095

X

PRTSTOP

094

X

QAUTH

121

X

QMGRAUTH

120

X

QMGREVNT

135

X

QMGROPTS

170

X

QMGRSEC

157

X

RMTPTDEF

209

X

RMTPTSEL

207

X

SECFUNCS

243

X

SECFUNDF

245

X

SECURITY

240

X

X

X

X

READ (or higher) lets users view
the remote session definitions.
UPDT (or higher) lets users change
remote session definitions and the
SLU session ID prefix. ALTR lets
users add and delete remote
session definitions.

READ (or higher) lets users access
the Security Definitions Menu.
UPDT (or higher) is required to
change the type of logon and
function security used.

Chapter 2: Security Definitions

Function Access Level Table

Minimum Level Required
Function

Code

SHIFTDEF

N

U

175

X

X

SHUTDOWN

003

X

SIGNON

001

X

STGCAUTH

123

X

STRGALTR

211

X

Works with the STRGNPRV and
STRGPRV functions. To alter
private storage, READ access must
be specified for STRGALTR and
UPDT must be specified for
STRGPRV. To alter nonprivate
storage, READ access must be
specified for STRGALTR and UPDT
must be specified for both
STRGPRV and STRGNPRV.

STRGDSPY

137

X

Works with the STRGNPRV and
STRGPRV functions. To display
private storage, READ access must
be specified for both STRGDSPY
and STRGPRV. To display
nonprivate storage, READ access
must be specified for both
STRGDSPY and STRGNPRV.

STRGNPRV

115

X

X

Works with the STRGDSPY,
STRGALTR, and STRGPRV
functions. To alter nonprivate
storage, you must be authorized to
alter private and nonprivate
storage. See the above notes for
the STRGDSPY and STRGALTR
functions for the authorization
required to display and alter
nonprivate storage.

STRGPRV

116

X

X

Works with the STRGDSPY and
STRGALTR functions. See the
above notes on these functions for
the authorization required to display
and alter private storage.
READ (or higher) lets users view
user command definitions. UPDT
(or higher) lets users add and
modify user command definitions.

THRDAUTH

156

X

USERCMDS

208

X

X

USERDEF

242

X

X

USERDIR

241

X

USERPROF

244

X

The Monitor for MVS 2.0
System Administrator’s Guide

C

A

Notes

R

READ (or higher) lets users view
the Shift Definition Facility. UPDT
(or higher) is required to update
shift definitions.

X

READ (or higher) lets users view
their own user ID definitions and
passwords. UPDT (or higher) lets
users review and update their own
user ID definitions and passwords.
ALTR lets users review and update
any user ID definition and password.

2-51

Function Access Level Table

Chapter 2: Security Definitions

Minimum Level Required
Function

Code

UTILMENU

150

TMON for MVS

N

R

U

C

A

Notes

X

The following table shows the minimum access level required to use
each product function for TMON for MVS.
Minimum Level Required

2-52

Function

Code

ADVFUNCS

203

X

CCWTRACE

142

X

N

R

CNTLFILE

238

X

CONSOLE

230

X

CSMON

099

X

CSMONDET

097

X

CSMONOPT

098

X

U

C

A

Notes

X

READ (or higher) lets users view
console displays. UPDT (or higher)
is required to enter commands on
console displays.

X

READ (or higher) lets users view
the Common Monitor Storage Detail
screen. UPDT (or higher) is
required to free storage for a
specified job name.

DATADCTS

222

X

DLYGRP

071

X

DLYGRPG

072

X

X

X

READ (or higher) lets users view
global workload delay definitions.
UPDT (or higher) lets users modify
an existing global workload delay
definition. ALTR lets users add or
delete a global workload delay
definition.

DLYGRPU

073

X

X

X

READ (or higher) lets users view
user workload delay definitions.
UPDT (or higher) lets users modify
an existing user workload delay
definition. ALTR lets users add or
delete a user workload delay
definition.

DLYMNDET

074

X

DLYMON

070

X

EXCPTDEF

130

X

GDCOPTS

079

X

HELPMENU

235

X

X

READ (or higher) lets users view
exception definitions. UPDT (or
higher) is required to update
exception definitions.

Chapter 2: Security Definitions

Function Access Level Table

Minimum Level Required
Function

Code

HLPFLDIR

N

U

236

X

X

READ (or higher) lets users view
the Field-Level Help Directory
screen. UPDT (or higher) is
required to change the ACTIVE
VERSION field on the Field-Level
Help Directory screen.

HLPFLDTL

237

X

HLPMSDIR

253

X

X

READ (or higher) lets users view
the Message-Level Help Directory
screen. UPDT (or higher) is
required to change the ACTIVE
VERSION field on the
Message-Level Help Directory
screen.

HLPSLDIR

205

X

X

READ (or higher) lets users view
the Screen-Level Help Directory
screen. UPDT (or higher) is
required to change the ACTIVE
VERSION field on the Screen-Level
Help Directory screen.

HLPSLDTL

206

X

IODVHIST

140

X

IOMON

143

X

IOPSTART

141

X

LOGOSCRN

004

X

MDFPRSM

176

X

OPENMAIN

217

X

PFKDEF

250

X

PROFDTL

246

X

PRTAUTOF

093

X

PRTAUTON

092

X

X

C

A

Notes

R

X

READ (or higher) lets users view
function key settings. UPDT (or
higher) lets users change function
key settings for their user ID. ALTR
lets users change function key
settings for any user ID.

PRTCLOSE

091

X

PRTCMD

090

X

PRTDFDSN

081

X

X

READ (or higher) lets users view
print screen data set name
definitions. UPDT (or higher) is
required to update print screen data
set name definitions.

PRTDFSYS

082

X

X

READ (or higher) lets users view
print screen SYSOUT definitions.
UPDT (or higher) is required to
update print screen SYSOUT
definitions.

PRTDFVTM

083

X

PRTMENU

080

X

PRTSTART

095

The Monitor for MVS 2.0
System Administrator’s Guide

X
2-53

Function Access Level Table

Chapter 2: Security Definitions

Minimum Level Required
Function

2-54

Code

N

R

U
X

C

A

Notes

X

READ (or higher) lets users view
the remote session definitions.
UPDT (or higher) lets users change
remote session definitions and the
SLU session ID prefix. ALTR lets
users add and delete remote
session definitions.

PRTSTOP

094

RMTPTDEF

209

X

X

RMTPTSEL

207

X

SECFUNCS

243

X

SECFUNDF

245

X

SECURITY

240

X

X

READ (or higher) lets users access
the Security Definitions Menu.
UPDT (or higher) is required to
change the type of logon and
function security used.

SHIFTDEF

177

X

X

READ (or higher) lets users view
the Shift Definition Facility. UPDT
(or higher) is required to update
shift definitions.

SHUTDOWN

003

X

SIGNON

001

X

STORTCBS

221

X

STORTIOT

220

X

STRGALTR

211

X

Works with the STRGNPRV and
STRGPRV functions. To alter
private storage, READ access must
be specified for STRGALTR and
UPDT must be specified for
STRGPRV. To alter nonprivate
storage, READ access must be
specified for STRGALTR and UPDT
must be specified for both
STRGPRV and STRGNPRV.

STRGDSPY

137

X

Works with the STRGNPRV and
STRGPRV functions. To display
private storage, READ access must
be specified for both STRGDSPY
and STRGPRV. To display
nonprivate storage, READ access
must be specified for both
STRGDSPY and STRGNPRV.

STRGNPRV

115

X

X

Works with the STRGDSPY,
STRGALTR, and STRGPRV
functions. To alter nonprivate
storage, you must be authorized to
alter private and nonprivate
storage. See the above notes for
the STRGDSPY and STRGALTR
functions for the authorization
required to display and alter
nonprivate storage.

Chapter 2: Security Definitions

Function Access Level Table

Minimum Level Required
Function

Code

STRGPRV

116

N

R

U

X

X

SVCDUPD

180

SYSADM

178

X

USERCMDS

208

X

X

USERDEF

242

X

X

C

A

Notes
Works with the STRGDSPY and
STRGALTR functions. See the
above notes on these functions for
the authorization required to display
and alter private storage.

X

USERDIR

241

X

USERPROF

244

X

UTILAPFL

155

X

UTILASMB

169

X

READ (or higher) lets users view
user command definitions. UPDT
(or higher) lets users add and
modify user command definitions.
X

X

READ (or higher) lets users view
their own user ID definitions and
passwords. UPDT (or higher) lets
users review and update their own
user ID definitions and passwords.
ALTR lets users review and update
any user ID definition and password.

READ (or higher) lets users browse
the APF list. UPDT (or higher) is
required to add, modify, and delete
modules in the APF list.

UTILDASD

153

X

UTILDDSL

158

X

UTILDSNI

175

X

UTILDSNU

174

X

UTILFSPC

159

X

UTILIOSB

170

X

UTILJOBB

171

X

UTILJOBS

154

X

UTILJPGN

165

X

UTILJTRM

164

X

X

UTILLNKL

157

X

X

READ lets users browse the
LNKLST Utility screen. UPDT (or
higher) is required to add, modify,
or delete the LNKLST.

UTILLPAL

156

X

X

READ (or higher) lets users browse
the LPA/Nucleus Utility screen.
UPDT (or higher) is required to
make modifications.

UTILMENU

150

X

UTILMSTG

152

X

UTILMVSB

166

X

The Monitor for MVS 2.0
System Administrator’s Guide

X

X

READ (or higher) lets users access
a utility. UPDT (or higher) is
required to cancel a job. CNTL (or
higher) is required to force a job.
ALTR is required to kill a job.

2-55

Function Access Level Table

Chapter 2: Security Definitions

Minimum Level Required

2-56

Function

Code

UTILSRMB

167

X

UTILSSVC

151

X

N

R

UTILSWAP

163

X

UTILVMNT

162

X

UTILVOLU

173

X

UTILVSMB

168

X

WKLDDEF

179

X

XCFMON

096

X

U

X

C

A

Notes

READ (or higher) lets users view
workload definitions. UPDT (or
higher) is required to update and
activate definitions.

Chapter 3: Landmark Product Communication
A performance problem in any address space in your network can
affect performance throughout the system. The ability to monitor
the complete system enables you to locate and solve system
problems quickly and easily. You can use Landmark product
communication to define a network between products and monitor
address spaces anywhere in the network.
The following PerformanceWorks MVS products support Landmark
product communication.

• TMON for CICS/ESA
• TMON for CICS/MVS
• TMON for DB2
• TMON for DBCTL
• TMON for MQSeries
• TMON for MVS
A product you want to access that exists in the same processor
complex is called a local product. Its VTAM applid is a local applid.
A product you want to access that exists in a different processor
complex is called a remote product. Its VTAM applid is a remote
applid. These terms are used throughout this chapter.

Access Methods
Landmark product communication consists of three types of
interproduct communication: explicit pass-through, implicit
pass-through, and NaviGate.

Explicit and Implicit
Pass-Through

You can access another product anywhere in the network,
regardless of which processor complex it resides in, using one of
the pass-through connections.
Explicit pass-through is product-to-product communication initiated
by the user. It can occur between products in the same or different
processor complexes.
Implicit pass-through is product-to-product communication initiated
automatically by the system. It occurs only between address
spaces of the same product and can occur between products in the
same or in different processor complexes.

• TMON for CICS has implicit pass-through connections to other
TMON for CICS products on any processor complex.

• TMON for DB2 has implicit pass-through connections to other
TMON for DB2 products on any processor complex.

The Monitor for MVS 2.0
System Administrator’s Guide

3-1

Access Methods

Chapter 3: Landmark Product Communication

• TMON for DBCTL has implicit pass-through connections to
other TMON for DBCTL products on any processor complex.

• TMON for MQSeries has implicit pass-through connections to
other TMON for MQSeries products on any processor complex.

• TMON for MVS has implicit pass-through connections to other
TMON for MVS products on any processor complex.
Each of these products also has explicit connections to any other
Landmark PerformanceWorks MVS product on any processor
complex.

NaviGate

You can access another product in the same processor complex
through one of many connection points using NaviGate. NaviGate
is smart product-to-product communication initiated automatically
by the system when you cursor-select a field that has a built-in
connection to another product in the same processor complex.
These connections help you diagnose problems by automatically
transferring you to useful screens in other products.
The following table shows which Landmark PerformanceWorks MVS
product releases have NaviGate connections to each other. A check
(✔) indicates that a NaviGate connection exists; a blank indicates
that no connection exists. A complete list of NaviGate connection
points for each Landmark PerformanceWorks MVS product can be
found in “Using NaviGate,” later in this chapter.

Connections

To:

Connections From:
Product

Rel

3.1

3.2

TMON for CICS/ESA

1.5

✔

✔

8.3

1.5

2.0

TMON
for
DBCTL
1.0
✔

TMON for
MQSeries

TMON for
MVS

1.0

1.3

2.0

✔

✔

1.1

2.0

✔

✔

✔

✔

TMON for CICS/MVS

8.3

✔

✔

✔

✔

TMON for DB2

3.1

✔

✔

✔

✔

✔

✔

✔

3.2

✔

✔

✔

✔

✔

✔

✔

✔

TMON for DBCTL

1.0

✔

✔

TMON for MQSeries

1.0

✔

✔

1.1

✔

✔

TMON for MVS

Error Messages

3-2

TMON for CICS

TMON for
DB2

1.3

✔

✔

✔

✔

✔

2.0

✔

✔

✔

✔

✔

You may receive error messages from a Landmark
PerformanceWorks MVS product you are trying to access using
Landmark product communication. Usually this happens when an
error occurs during the attempt to access the product. For help

Chapter 3: Landmark Product Communication

Setting Up Landmark Product Communication

with these messages, refer to the messages and codes manual for
the appropriate product.

Setting Up Landmark Product Communication
Before you can use Landmark product communication with any of
the Landmark PerformanceWorks MVS products, you must complete
these steps. (Each step is described in more detail following the
checklist.)
Step 1.

Verify that all local VTAM applids are installed.

Step 2.

Identify all product session applids to be defined.

Step 3.

Set up cross-domain communications to support remote applids.

Step 4.

Verify cross-domain communications.

Step 5.

Define additional SLUs to VTAM on the local processor complex.

Step 6.

Set up network requirements for non-SNA terminals.

Step 7.

Identify the applid of the primary session of each product.

Step 8.

Adjust the local SLU session ID prefix and all the session
definitions.

Step 9.

Check the security definitions on all systems.

Step 10.

Verify that the correct product releases are installed.

Step 1

Verify that all local VTAM applids are installed.
For each CPU in your system, verify that all local VTAM applids
are defined and that the appropriate products are installed. Local
applids are the applids of products installed on the same CPU.
Local applids should be defined during product installation. Refer
to PerformanceWorks for MVS and OS/390 Installation Guide to verify
that this occurred.

Step 2

Identify all product session applids to be defined.
Identify all product session applids (local and remote) to be
defined to the local processor complex. Use a table in the form
shown below to list all the product applids you want to be able to
access from the products in your local processor complex.
For example, you might need the following two remote applids:
TMDBCHI (a TMON for DB2 applid on VTAM2 in Chicago) and
TMONPGH (a TMON for CICS applid on VTAM3 in Pittsburgh).

The Monitor for MVS 2.0
System Administrator’s Guide

3-3

Setting Up Landmark Product Communication

Chapter 3: Landmark Product Communication

Product

Step 3

Applid

System

Set up cross-domain communications to support remote applids.
Set up cross-domain communications to support each of the remote
applids listed in Step 2. Use adjacent system services control point
(SSCP) tables, dynamic cross-domain resource (CDRSC)
definitions, or hard-coded CDRSC definitions. For complete
information on customizing VTAM, read IBM’s VTAM Installation
& Resource Definition.
You can use the CDRM definition in SYS1.VTAMLST to set up
dynamic CDRSC definitions. The CDRDYN=YES and
CDRSC=OPT parameters in the definition must be set up on the
local processor complex and all the remote processor complexes. In
addition, you must define each of the remote applids to the local
VTAM applid. The example below shows the definitions for
remote applids TMONCHI, TMONBOS, TMONNYC, and
TMONPGH. VTAM2 and VTAM3 are sample CDRM definition
names for VTAM applids running on remote processor complexes.
These definitions would be created in SYS1.VTAMLST on VTAM1.
VTAM2
TMONCHI
TMONBOS
TMONNYC
VTAM3
TMONPGH

Step 4

CDRM
CDRSC
CDRSC
CDRSC
CDRM
CDRSC

CDRDYN=YES,CDRSC=OPT
CDRM=VTAM2,ISTATUS=ACTIVE
CDRM=VTAM2,ISTATUS=ACTIVE
CDRM=VTAM2,ISTATUS=ACTIVE
CDRDYN=YES,CDRSC=OPT
CDRM=VTAM3,ISTATUS=ACTIVE

Verify cross-domain communications.
Using the remote applids in the list you created in Step 2, verify
cross-domain communications by trying to log onto each of the
remote product sessions from your local VTAM logon screen.

Step 5

Define additional SLUs to VTAM on the local processor complex.
If you did not do this during product installation, define additional
secondary logical units (SLUs) to VTAM on the local processor
complex using VTAM VBUILD and APPL macros. Create a
separate SYS1.VTAMLST member to store these SLU definitions.
For complete information on customizing VTAM, read IBM’s
VTAM Installation & Resource Definition.
To determine how many SLUs to define, use the following formula:

3-4

Chapter 3: Landmark Product Communication

Setting Up Landmark Product Communication

number−remote−users × number−remote−sessions = total−SLUs

You should define a minimum of 10 SLUs. A maximum of 999
SLUs can be defined.
For TMON for CICS, you need to define one applid for:

• Each group of CICS jobs on the Job Selection List screen from a
remote TMON for CICS

• Each pass-through session you expect to need
• Each remote TMON for CICS displayed by the Performance
Monitor

• Each Activity Monitor display of a transaction using
intersystem communication (ISC)

• Each concurrent attempt to cancel an interval control element
(ICE) or automatic initiate descriptor (AID) in CICS.

Note

The number of SLUs you define should match the setting in the
SLUCOUNT startup parameter, which controls the number of
SLUs the Landmark PerformanceWorks MVS product attempts to
access at a given time.
You can specify the SLUCOUNT parameter in the startup
parameter member of your product. If you do not specify it, the
number of SLUs defaults to 123.
The following table indicates the SLUCOUNT startup parameter
for each Landmark PerformanceWorks MVS product.

The Monitor for MVS 2.0
System Administrator’s Guide

Product

Description

TMON for CICS/ESA

Specify the SLUCOUNT startup
parameter in member TCEPARM of the
data set identified by ddname
TMONPRMS in the TMON for CICS/ESA
startup JCL.

TMON for CICS/MVS

Specify the SLUCOUNT startup
parameter in member TMON8PRM of the
data set identified by ddname
TMONPRMS in the TMON for CICS/MVS
startup JCL.

TMON for DB2

Specify the SLUCOUNT startup
parameter in member TDBPARM of the
data set identified by ddname
TMDBPRMS in the TMON for DB2 startup
JCL.

TMON for DBCTL

Specify the SLUCOUNT startup
parameter in member TDBCPRMS of the
data set identified by ddname
TDBCPRMS in the TMON for DBCTL
startup JCL.

3-5

Setting Up Landmark Product Communication

Chapter 3: Landmark Product Communication

Product

Description

TMON for MQSeries

Specify the SLUCOUNT startup
parameter in member TMQSPARM of the
data set identified by ddname
TMQSPRMS in the TMON for MQSeries
startup JCL.

TMON for MVS

Specify the SLUCOUNT startup
parameter in member TMVSPARM of the
data set identified by ddname
TMVSPRMS in the TMON for MVS startup
JCL.

Use the following template when coding your SLU definitions. A
sample of an SLU definition can be found in member TCEVTAM
(TMON for CICS/ESA), TMON8VTM (TMON for CICS/MVS),
TMDBVTAM (TMON for DB2), TDBCVTAM (TMON for DBCTL),
TMQSVTAM (TMON for MQSeries), or TMONAPPL (TMON for
MVS) in the sample JCL library.
label
sluidnnn
sluidnnn
sluidnnn

VBUILD TYPE=APPL
APPL AUTH=(ACQ,PASS,VPACE),VPACING=5,EAS=1,
DLOGMOD=SLUTYPE2,MODTAB=LMRKMTB
APPL AUTH=(ACQ,PASS,VPACE),VPACING=5,EAS=1,
DLOGMOD=SLUTYPE2,MODTAB=LMRKMTB
APPL AUTH=(ACQ,PASS,VPACE),VPACING=5,EAS=1,
DLOGMOD=SLUTYPE2,MODTAB=LMRKMTB

“label” indicates the SYS1.VTAMLST member name used to store
the SLU definitions and “sluidnnn” indicates the name of the SLU
you are defining. The “sluid” part of the name is the SLU session
ID prefix and must be a constant string from one to five characters
long. The “nnn” part must be a number starting with 001 and
sequentially increment with each APPL macro.
For example, if you use TMON as a session ID prefix and define the
following SLUs to VTAM, only TMON001, TMON002, and
TMON003 are used. TMON006 is not used because TMON004 and
TMON005 are missing.
TMON001
TMON002
TMON003
TMON006

APPL AUTH=(ACQ,PASS,VPACE),VPACING=5,EAS=1,
DLOGMOD=SLUTYPE2,MODTAB=LMRKMTB
APPL AUTH=(ACQ,PASS,VPACE),VPACING=5,EAS=1,
DLOGMOD=SLUTYPE2,MMODTAB=LMRKMTB
APPL AUTH=(ACQ,PASS,VPACE),VPACING=5,EAS=1,
DLOGMOD=SLUTYPE2,MODTAB=LMRKMTB
APPL AUTH=(ACQ,PASS,VPACE),VPACING=5,EAS=1,
DLOGMOD=SLUTYPE2,MODTAB=LMRKMTB

You must use different SLU prefixes on different processor
complexes and for different products running in the same
processor complex.

3-6

Chapter 3: Landmark Product Communication

VTAM Logon
Mode Table
Considerations

Setting Up Landmark Product Communication

The DLOGMOD parameter of the APPL macro specifies the name
of the entry in the VTAM logon mode table that contains the
parameters used in a session. If you have SNA type-2 logical units
and your logon mode table is working, continue to use it. If you
have problems, however, create your own logon mode table with
the following entry. The following sample of a logon mode table
can be found in member LMRKMTB in the Strategic Services
sample JCL library.
LMRKMTB MODETAB
MODEENT LOGMODE=SLUTYPE2,FMPROF=X’03’,TSPROF=X’03’,
PRIPROT=X’B1’,SECPROT=X’90’,COMPROT=X’3080’,
RUSIZES=X’87C7’,PSERVIC=X’028000000000185018507F00
MODEEND
END

In this entry, the name defined by the LOGMODE operand
(SLUTYPE2 in the sample LMRKMTB above) can be any
8-character name. The FMPROF, TSPROF, PRIPROT, SECPROT,
and COMPROT operand settings are fixed by the SNA architecture
to support SNA type-2 logical units. The RUSIZES operand
specifies the maximum length of data that the primary logical unit
(PLU) and the secondary logical unit (SLU) can send. These first
two hexadecimal digits define the size for the SLU; the second two
hexadecimal digits define the size for the PLU. The actual sizes
designated by a setting of RUSIZES=X’87C7’ are 1024 bytes for the
SLU (’87’ = 8 times 2 to the seventh power) and 1536 bytes for the
PLU (’C7’ = 12 times 2 to the seventh power).
Finally, the PSERVIC operand defines the presentation services for
the logical unit. The PSERVIC setting must be as shown above for
the SLU sessions to properly function as SNA type-2 logical units.
The values are defined in the section on BIND command session
parameters in IBM’s 3174 Subsystem Control Unit Functional
Description.
If you decide to use the sample logon mode table, LMRKMTB, you
must assemble it to some library that you have concatenated to
SYS1.VTAMLIB in your VTAM startup procedure.
If you define your own logon mode table or use LMRKMTB, you
must supply the name of the logon mode table by adding the
MODTAB option to your APPL macro. You also must change
“dlogmod” in your SLU definitions to reflect the correct
LOGMODE entry. The following example shows two SLU
definitions in member SAMPLE. TMDB001 uses IBM default
parameters provided by SNX32702; TMDB002 uses the parameters
specified by the SLUTYPE2 entry in LMRKMTB.
SAMPLE VBUILD TYPE=APPL
TMDB001 APPL AUTH=(ACQ,PASS,VPACE),VPACING=5,EAS=1,DLOGMOD=SNX32702
TMDB002 APPL AUTH=(ACQ,PASS,VPACE),MODTAB=LMRKMTB,VPACING=5,EAS=1,
DLOGMOD=SLUTYPE2
The Monitor for MVS 2.0
System Administrator’s Guide

3-7

Setting Up Landmark Product Communication

Step 6

Chapter 3: Landmark Product Communication

Set up network requirements for non-SNA terminals.
This section primarily applies if you intend to log onto the
Landmark PerformanceWorks MVS product from a non-SNA
terminal that either is remote or will be in cross-domain session
with the product. It also may apply to SNA sessions if the
outbound RUSIZE in the BIND is very large or is not specified. If
none of these conditions apply to your use of the product, you can
skip this section.
Landmark PerformanceWorks MVS products sometimes transmit
very large outbound data streams, especially if the terminal is a
color terminal with a large screen (a 3270 model 3, 4, or 5). Since
non-SNA terminals do not support chaining, the entire screen must
be sent in one transmission. In some networks, the large size of
these transmissions can be a problem for the network.
To support the largest possible transmission, the MAXDATA
parameter on any Network Control Program (NCP) between the
terminal and the host in which the product is running should be set
to at least 14,000 bytes. MAXDATA is the maximum message size
the NCP will accept. Most screens are much smaller than 14,000,
but this is a safe value for MAXDATA that no product screen
should ever exceed. If none of your terminals use color, you may
be able to run with a smaller value.

MAXDATA should not exceed
the product of MAXBFRU
and UNITSZ.

Step 7

If you change MAXDATA, be aware that its value is constrained by
the values of the MAXBFRU parameter (the number of host buffers
VTAM uses to communicate with NCP) and the UNITSZ parameter
(the size of each host buffer). The MAXDATA value should not
exceed the product of MAXBFRU and UNITSZ.
Identify the applid of the primary session of each product.
Identify the applid of the primary session for each product using
Landmark product communication on your system. Primary
sessions are the product sessions accessed when you enter the JUMP
command to explicitly access another product. Each unique
Landmark PerformanceWorks MVS product on your system should
have at least one primary session. More than one primary session
can be defined for each. When more than one primary session is
defined and a JUMP command is issued, the first primary session
found active is used to satisfy the JUMP request.
Primary sessions are actually defined on the Remote Session
Definition screen in Step 8, but you should know what the applid
of the primary session is for each product before you start Step 8. If
an address space is not the primary session, it is called a secondary
session.
If no primary session is active when the JUMP command is issued,
the first secondary session found active is used to satisfy the JUMP
request.

3-8

Chapter 3: Landmark Product Communication

Step 8

Setting Up Landmark Product Communication

Adjust the local SLU session ID prefix and all the session
definitions.
Use the Remote Sessions Directory and Remote Session Definition
screens to adjust the local SLU session ID prefix and all the session
definitions of Landmark PerformanceWorks MVS products in the
network that you want to be able to access. The following table
indicates how to access these screens from each Landmark product.
Product

To Gain Access:

TMON for CICS/ESA

Enter =10.6 on the command line of any
TMON for CICS/ESA screen.

TMON for CICS/MVS

Enter =10.8 on the command line of any
TMON for CICS/MVS screen.

TMON for DB2

Enter =9.5.1 on the command line of
any TMON for DB2 screen.

TMON for DBCTL

Enter =9.7 on the command line of any
TMON for DBCTL screen.

TMON for MQSeries

Enter =9.5 on the command line of any
TMON for MQSeries screen.

TMON for MVS

Enter =S.1 on the command line of any
TMON for MVS screen.

All remote sessions screens are described at the end of this chapter.

Step 9

Check the security definitions on all systems.
You should use the same security method (External Security,
Internal Security, or User Exit Security) for all Landmark product
systems that support Landmark product communication. If you
choose to mix security methods, you must ensure that the user IDs
and passwords are identical in all product systems. Security must
be activated in each product, regardless of the method you choose.
When explicit pass-through, implicit pass-through, or NaviGate
communication occurs, a logon to the other product occurs. If a
user ID is not authorized to use a product it has tried to access
using implicit pass-through or NaviGate, the product connection
does not occur. If a user ID is not authorized to use a product it has
tried to log onto using explicit pass-through, the product logon
screen is displayed. Users then can select an alternate user ID and
password for explicit pass-through.
If you choose to use Internal Security for all Landmark products,
ensure that the user IDs and passwords you want to use Landmark
product communication are identical for all product sessions.
If you choose to use External Security for all Landmark products,
ensure that all user IDs that you want to use Landmark product
communication have access to the appropriate resource rules for
your external security package.

The Monitor for MVS 2.0
System Administrator’s Guide

3-9

Using Explicit Pass-Through

Chapter 3: Landmark Product Communication

For all security types, verify that the user IDs you want to use
Landmark product communication are authorized to use functions
in the Landmark product communication network. Read the
chapter on Landmark product communication in each product’s
documentation to identify that product’s connection points and the
functions it accesses by linking to other products.

Step 10

Verify that the correct product releases are installed.
Verify that you have the correct releases of all products installed.
Otherwise, Landmark product communication will not operate
correctly.

Using Explicit Pass-Through
Explicit pass-through is product-to-product communication
initiated by the user. This communication method lets you:

• Access products in your network for online monitoring and
analysis

• Access a specific product applid
• Quickly log onto another product without having to log off of
the base product

• Quickly sign onto a CICS address space without having to sign
off of TMON for CICS (applies only to TMON for CICS/ESA
and TMON for CICS/MVS).
Explicit pass-through can occur between products in the same or
different processor complexes.

Methods of Explicit
Access

You can explicitly access another Landmark product in one of three
ways. You can:

• Issue the JUMP command.
• Issue the REMOTE command.
• Cursor-select an applid on the Remote Sessions Logon screen,
described later in this chapter. (For TMON for CICS, you must
access this screen through the Pass-Through Sessions menu. If
you are using TMON for CICS documentation, the menu is
described later in this chapter.)
If you try to access a product that is not active, an error message is
displayed.
TMON for CICS users

3-10

With TMON for CICS, you also can pass-through to CICS and
execute transactions that help you determine the cause of a system
problem. You do this using the Pass-Through Session to CICS
screen, described later in this chapter, if you are using TMON for
CICS documentation.

Chapter 3: Landmark Product Communication

JUMP Command

Using Explicit Pass-Through

Use the JUMP command to access the primary applid of a
Landmark product. You identified primary applids in Step 7 and
defined them in Step 8 of “Setting Up Landmark Product
Communication,” earlier in this chapter.
The syntax of the JUMP command is:
JUMP=code

where “code” is one of the following product identifiers.

REMOTE
Command

Product

Identifier

TMON for CICS

TMONCICS

TMON for DB2

TMONDB2

TMON for DBCTL

TMONDBC

TMON for MQSeries

TMONMQ

TMON for MVS

TMONMVS

Use the REMOTE command to access a specific applid of a
Landmark product. The syntax of the REMOTE command is:
REMOTE=applid

where “applid” is the applid of the product you want to access.
TMON for CICS/ESA example

Usage Notes

For example, if you want to access TMON for CICS/ESA applid
TCECHI, enter REMOTE=TCECHI.
A product accessed explicitly operates in exactly the same manner
as if you log onto it directly. The only difference is that explicit
access automatically logs you onto the product and skips the
product logon screen. You can perform all the product functions
on the explicitly accessed product that your user ID can perform
when you log onto the product directly. Any security limitations
set up for your user ID when you access the product directly are
active when you access the product explicitly. If your user ID is not
authorized to use the explicitly accessed product, the product
session’s logon screen is displayed. You then can select an
alternate user ID and password to complete explicit pass-through.
You may receive error messages from a Landmark product you are
trying to access explicitly. Usually this happens when an error
occurs during the access attempt. For help with these messages,
refer to the messages and codes manual for the appropriate
product.
When you log off of a product you accessed explicitly from one of
the Landmark PerformanceWorks MVS products, you return to the
same Landmark product. For example, when you log off of a

The Monitor for MVS 2.0
System Administrator’s Guide

3-11

Using Implicit Pass-Through

Chapter 3: Landmark Product Communication

product you accessed explicitly from TMON for DBCTL, you return
to TMON for DBCTL.

Using Implicit Pass-Through
Implicit access is product-to-product communication initiated
automatically by the system. It occurs only between address spaces
of the same product (for example, TMON for CICS to TMON for
CICS) and can occur between products in the same or different
processor complexes. It does not occur between different products
(for example, TMON for CICS to TMON for MVS).
Implicit access is initiated differently for Landmark
PerformanceWorks MVS products. The following table indicates
how to initiate implicit access for each product.
Product

Implicit Access

TMON for CICS

Initiated by selecting a remote CICS address space
from the Job Selection List screen and a Primary
Selection Menu option other than PERFORMANCE
MONITOR, PASS-THROUGH SESSIONS, or SYSTEM
ADMINISTRATION. This allows you to monitor the
performance of another CICS address space. To
ensure that a remote CICS address space appears on
the Job Selection List screen, the following conditions
must be met: The remote Cross System Monitor
applid must be defined on the Remote Sessions
Directory and CICS Job Definitions screens, and
JOBSCAN CONTROL=N must be specified on the
CICS Job Definitions screen.

TMON for DB2

Initiated by selecting a remote DB2 subsystem on the
DB2 Subsystem Selection screen and a Primary Menu
option other than MONITOR CONTROLS or
ADVANCED FUNCTIONS. You also can invoke
implicit access in TMON for DB2 when you
cursor-select a data field associated with a remote
DB2 subsystem from the DB2 Subsystem Selection
screen.

TMON for DBCTL

Initiated by selecting a remote DBCTL subsystem on
the DBCTL Subsystem Selection screen and a Primary
Menu option other than MONITOR CONTROLS or
ADVANCED FUNCTIONS. You also can invoke
implicit access in TMON for DBCTL when you
cursor-select a data field associated with a remote
DBCTL subsystem from the DBCTL Subsystem
Selection screen.

TMON for MQSeries Initiated by selecting a queue manager being
monitored by a TMON for MQSeries running on
another MVS image and a Primary Menu option other
than MONITOR CONTROLS or ADVANCED
FUNCTIONS.
TMON for MVS

3-12

Initiated in only one instance: when you select an MVS
system on another processor complex on the System
Selection Menu.

Chapter 3: Landmark Product Communication

Usage Notes

Using NaviGate

Any security limitations set up for your user ID when you access
the product directly are active when you access the product
implicitly. If your user ID is not authorized to use the product,
implicit access does not occur. If you are to be able to access other
Landmark PerformanceWorks MVS systems remotely, their security
systems must be the same.
You may receive error messages from a Landmark product you are
trying to access implicitly. Usually this happens when an error
occurs during the access attempt. For help with these messages,
refer to the messages and codes manual for the appropriate
product.
When you log off of a product you accessed implicitly from one of
the Landmark PerformanceWorks MVS products, you return to the
same Landmark product. For example, when you log off of a
product you accessed implicitly from TMON for MQSeries, you
return to TMON for MQSeries.

Using NaviGate
NaviGate is product-to-product communication initiated
automatically by the system when you cursor-select a field that has
a built-in connection to another product. These connections help
you diagnose problems by automatically transferring you to useful
screens in other products.
A compass symbol to the left of a field name indicates that you can
cursor-select that field to access another Landmark product.
NaviGate connections occur between products in the same
processor complex. When you invoke a NaviGate connection in a
processor complex, the other product you access also exists in the
same processor complex. If you implicitly or explicitly access a
product in a different (remote) processor complex and then invoke
a NaviGate connection, the NaviGate connection is made in the
remote processor complex.
If you try to invoke a NaviGate connection for a product that is not
active, the connection attempt fails. The screen is refreshed, but no
message is issued.

TMON for CICS/ESA

The following table shows where the NaviGate connections to
other Landmark PerformanceWorks MVS products occur in TMON
for CICS/ESA.

From this screen:

Cursor-select:

To access this screen:

CICS DBCTL Summary

CONNECTION STATUS field

TMON for DBCTL Current System
Statistics

The Monitor for MVS 2.0
System Administrator’s Guide

3-13

Using NaviGate

Chapter 3: Landmark Product Communication

From this screen:

Cursor-select:

To access this screen:

CICS MQSeries Summary

MQ_SERIES QMGR NAME
field (available for only CICS
Transaction Server 1.1 and
above)

TMON for MQSeries Connection
Summary

CICS Storage Summary

REGION-SIZE field

TMON for MVS Private Storage

Detail Transaction Data

LOC UOW field

TMON for DBCTL PSB Detail

UOW field

TMON for DB2 Online Analysis
Thread Summary

FCT/VSAM Statistics (when summarized
by file/DB on the File/DB Activity
Selection Menu)

device ID in the VOLUME field

TMON for MVS Device Detail
Selection Menu

File/DB Activity Display (when
summarized by file/DB on the File/DB
Activity Selection Menu)

DL/I file in the FILE ID field

TMON for DBCTL Database
Management Block Statistics

File/DB Activity Display (when
summarized by VOLSER on the File/DB
Activity Selection Menu)

volume serial number of a
volume in the VOLSER field

TMON for MVS Device Detail
Selection Menu

MVS Contention Monitor Menu

Option 1
(ACTIVE JOB SUMMARY)

TMON for MVS Job Execution
Monitor

MVS Contention Monitor Menu

Option 2
(DETAILED ANALYSIS)

TMON for MVS Job Delay Analysis

System Control Blocks

CSAM field

TMON for MVS Common Storage
Summary

System Control Blocks

CSAP field

TMON for MVS CSA Subpool Detail

System Control Blocks

SQA field

TMON for MVS SQA Subpool Detail

System Control Blocks

VSSM field

TMON for MVS Virtual Storage
Static Map

Task Details

DB2 field

TMON for DB2 Current Thread
Detail

DBCTL field

TMON for DBCTL Thread Detail

MQS field

TMON for MQSeries Thread
Summary

TMON for CICS/MVS

The following table shows where the NaviGate connections to
other Landmark PerformanceWorks MVS products occur in TMON
for CICS/MVS.

From this screen:

Cursor-select:

To access this screen:

Current Task Execution

DB2 THREAD field

TMON for DB2 Activity Monitor
Thread Detail

FCT/VSAM Statistics (when summarized
by file/DB on the File/DB Activity
Selection Menu)

device ID in the VOLUME field

TMON for MVS Device Detail
Selection Menu

File/DB Activity Display (when
summarized by VOLSER on the File/DB
Activity Selection Menu)

volume serial number in the
VOLSER field

TMON for MVS Device Detail
Selection Menu

MVS Contention Monitor Menu

Option 1
(ACTIVE JOB SUMMARY)

TMON for MVS Job Execution
Monitor

MVS Contention Monitor Menu

Option 2
(DETAILED ANALYSIS)

TMON for MVS Job Delay Analysis

3-14

Chapter 3: Landmark Product Communication

Using NaviGate

From this screen:

Cursor-select:

To access this screen:

Sequential File Statistics (when
summarized by file/DB on the File/DB
Activity Selection Menu)

file number in the FILE# field

TMON for MVS Device Detail
Selection Menu

TMON for DB2

The following table shows where the NaviGate connections to
other Landmark PerformanceWorks MVS products occur in TMON
for DB2.

From this screen:

Cursor-select:

To access this screen:

Active Log Data Set Statistics

VOLSER field

TMON for MVS Device Detail
Selection Menu

Current Thread Connection Summary

CONN ID field

TMON for CICS Performance
Graphs Target Selection

Current Thread Detail

CICS TKN field

TMON for CICS/ESA Active Tasks

Current Thread Summary (Long or Short) CONN ID field

TMON for CICS/ESA Active Tasks
or TMON for CICS/MVS Combined
Task List

DB2 Resource Usage - Allocated Data
Sets

VOLSER field

TMON for MVS Device Detail
Selection Menu

DBRM/Package List Summary

package in the
DBRM/PACKAGE field that
resides in a DB2 subsystem
monitored by a different TMON
for DB2 address space

DB2 EXPLAIN Utility for the remote
TMON for DB2

Online Analysis Thread Detail

CICS TKN field

TMON for CICS/ESA Detail
Transaction Data or TMON for
CICS/MVS Full Statistics Page 1

Page Set Detail Data Set Listing

VOLSER field

TMON for MVS Device Detail
Selection Menu

Primary Menu

Option 4
(ACTIVE JOB SUMMARY)

TMON for MVS Job Execution
Monitor

SYSIBM.SYSLOCATIONS

DB2 location in the #DB2
DB2 EXPLAIN Utility for the remote
LOCATIONS field that is not the TMON for DB2
local DB2 system

TMON for DBCTL

The following table shows where the NaviGate connections to
other Landmark PerformanceWorks MVS products occur in TMON
for DBCTL.

From this screen:

Cursor-select:

To access this screen:

BMP Thread Detail

JOB NAME field

TMON for MVS Job Execution
Monitor

Current Thread Connection Summary

CONN_ID field

TMON for CICS/ESA Active Tasks

NBR THDS field

TMON for CICS/ESA CICS DBCTL
Summary

Current Thread Summary (Long or Short) CONN-ID field

TMON for CICS/ESA Active Tasks

Data Set Information Display

TMON for MVS Device Detail
Selection Menu

The Monitor for MVS 2.0
System Administrator’s Guide

VOL field

3-15

Using NaviGate

Chapter 3: Landmark Product Communication

From this screen:

Cursor-select:

To access this screen:

Primary Menu

Option 4
(ACTIVE JOB SUMMARY)

TMON for MVS Job Execution
Monitor

PSB Detail

CICS TKN field

TMON for CICS/ESA Detail
Transaction Data

Thread Detail

RECVRY TOKEN field

TMON for CICS/ESA Task Details

VSAM Data Set Information

VOLUME field

TMON for MVS Device Detail
Selection Menu

TMON for MQSeries

The following table shows where the NaviGate connections to
other Landmark PerformanceWorks MVS products occur in TMON
for MQSeries.

From this screen:

Cursor-select:

To access this screen:

Active Log Data Set Statistics

VOLSER field

TMON for MVS Device Detail
Selection Menu

Primary Menu

Option 5
(ACTIVE JOB SUMMARY)

TMON for MVS Job Execution
Monitor

Thread Detail

CORRELATION field

TMON for CICS/ESA Task Details

TMON for MVS

The following table shows where the NaviGate connections to
other Landmark PerformanceWorks MVS products occur in TMON
for MVS.

From this screen:

Cursor-select:

To access this screen:

Job Detail Selection Menu

Option 11 (after
cursor-selecting a CICS job
name on the Job Execution
Monitor screen)

TMON for CICS Primary Selection
Menu

Option 11 (after
cursor-selecting a DB2 job
name on the Job Execution
Monitor screen)

TMON for DB2 Primary Menu

Usage Notes

When you connect to a second Landmark PerformanceWorks MVS
product using NaviGate, you are transferred to a specific screen in
the second product. This screen is called a connection screen.
Ordinarily, you can use this screen exactly as if you had accessed it
by logging onto the second product directly. The only exception is
that when you enter the END command (or press the appropriate
function key), you are transferred back to the initial product. In
other words, you can enter commands and options that place you
further (or deeper) into the second product, but you cannot access
screens that would ordinarily be displayed earlier in the product
than the connection screen.
Any security limitations set up for your user ID when you access
the product directly are active when you access a second product
using NaviGate. If your user ID is not authorized to use the second
product, the NaviGate connection does not occur.

3-16

Chapter 3: Landmark Product Communication

Using NaviGate

You may receive error messages from a Landmark product you are
trying to access using NaviGate. Usually this happens when an
error occurs during the access attempt. For help with these
messages, refer to the messages and codes manual for the
appropriate product.
When you log off of a product you accessed using a NaviGate
connection from one of the Landmark PerformanceWorks MVS
products, you return to the same Landmark product. For example,
when you log off of a product you accessed using a NaviGate
connection from TMON for DB2, you return to TMON for DB2.
Accessing All
Screens

If you want to access a screen ordinarily displayed earlier in the
product than the connection screen, enter the STAY command on
the command line of the second product.
The syntax of the STAY command is:
STAY

Once you have entered the STAY command, you can access any
screen in the product. Of course, any security limitations set up for
your user ID are still in effect.

The Monitor for MVS 2.0
System Administrator’s Guide

3-17

Remote Sessions Directory

Chapter 3: Landmark Product Communication

Remote Sessions Directory
JOBNAME:
SYSID :

THE MONITOR FOR MVS
VERSION: 2.0
REMOTE SESSIONS DIRECTORY

DATE:
TIME:

COMMAND:
SLU APPLID PREFIX

_
_
_
_
_
_
_
_
_
_
_
_
_

APPLID
TMDBCHI
TMVSCHI
TMON2CHI
TMDBNYC
TMVSNYC
TMON8NYC
TMDBPGH
TMVSPGH
TMON8PGH
TMON2NYC
TMDBSF
TMVSSF
TMON2SF

PRODUCT
TMONDB2
TMONMVS
TMONCICS
TMONDB2
TMONMVS
TMONCICS
TMONDB2
TMONMVS
TMONCICS
TMONCICS
TMONDB2
TMONMVS
TMONCICS

TMVSP
STATUS
INACT
ACTIVE
ACTIVE
ACTIVE
ACTIVE
ACTIVE
ACTIVE
ACTIVE
INACT
INACT
ACTIVE
ACTIVE
INACT

<-- OVERTYPE TO CHANGE PREFIX

VER
03.1
02.0
02.0
03.2
02.0
08.3
03.2
02.0
08.3
02.0
03.1
01.3
02.0

DESCRIPTION
THE MONITOR
THE MONITOR
THE MONITOR
THE MONITOR
THE MONITOR
THE MONITOR
THE MONITOR
THE MONITOR
THE MONITOR
THE MONITOR
THE MONITOR
THE MONITOR
THE MONITOR

HELP INFORMATION = PF1

FOR
FOR
FOR
FOR
FOR
FOR
FOR
FOR
FOR
FOR
FOR
FOR
FOR

DB2 IN CHICAGO
MVS IN CHICAGO
CICS IN CHICAGO
DB2 IN NEW YORK
MVS IN NEW YORK
CICS IN NEW YORK
DB2 IN PITTSBURGH
MVS IN PITTSBURGH
CICS IN PITTSBURGH
CICS/ESA IN NY V2.0
DB2 IN SAN FRANCISCO
DB2 IN SAN FRANCISCO
CICS/ESA IN SAN FRANCISCO

PF KEY ASSIGNMENTS = PA1

The Remote Sessions Directory screen lists all Landmark
PerformanceWorks MVS products defined in your network and the
current SLU session ID prefix. You can update the prefix on this
screen. If you do, the prefix setting is saved in the control file. If
you prefer to update the prefix temporarily (rather than in the
control file), use the SLUPREFIX startup parameter instead. For
more information on the SLUPREFIX startup parameter, refer to
your Landmark product’s installation completion instructions in
PerformanceWorks for MVS and OS/390 Installation Guide.
If you want to add, update, or delete product sessions in the list,
you must cursor-select a session. All session definitions are stored
in your product’s control file.

Accessing this Screen
Product

Action

Displays

TMON for CICS/ESA

On the command line, enter =10.1.6 .

Remote Sessions Directory

TMON for CICS/MVS

On the command line, enter =10.1.8 .

Remote Sessions Directory

TMON for DB2

On the command line, enter =9.5.1.

Remote Sessions Directory

TMON for DBCTL

On the command line, enter =9.7.1.

Remote Sessions Directory

TMON for MQSeries

On the command line, enter =9.5.1.

Remote Sessions Directory

TMON for MVS

On the command line, enter =S.1 .

Remote Sessions Directory

Primary Commands

3-18

To access this screen, complete one of the following paths.

Use the DOWN and UP commands to scroll through this screen. To
learn about the various ways to scroll using these commands and
for syntax and descriptions of all commands, see Chapter 2 in your
product reference manual.

Chapter 3: Landmark Product Communication

Fields

Remote Sessions Directory

➥ APPLID
Displays the applid of a Landmark product defined in the control
file. All applids defined in the control file are shown.
Cursor-select an applid if you want to update or delete it or if you
want to use it as a template for a new applid. The Remote Session
Definition screen is displayed.
DESCRIPTION

Displays a brief description of the session definition.
PRODUCT

Displays the product for this session definition. The following
table lists valid identifiers.
Identifier

Product

TMONCICS

TMON for CICS (CICS/ESA) and
TMON for CICS (CICS/MVS)

TMONDB2

TMON for DB2

TMONDBC

TMON for DBCTL

TMONMQ

TMON for MQSeries

TMONMVS

TMON for MVS

SLU APPLID PREFIX

Shows the SLU session ID prefix, which is used to create the SLUs
that are used to access Landmark products. The session ID prefix
may be up to five characters long and must be unique across all
products in your network. To change the SLU session ID prefix,
tab to this field, change it, and press ENTER. When you change the
SLU session ID prefix on this screen, the change is saved in the
product control file. To change the session ID temporarily, use the
SLUPREFIX startup parameter. For more information, refer to the
installation completion instructions for your Landmark product in
PerformanceWorks for MVS and OS/390 Installation Guide.
You must use different SLU prefixes on different processor
complexes and for different products running in the same
processor complex.
STATUS

Indicates the status of the Landmark product. The following table
lists valid status indicators.
Status

Description

ACTIVE

The product is active.

INACT

The product is not active.

UNKNWN

The status of the product cannot be
determined.

VER

Displays the version of the Landmark product. The value in the
VER field is always zero unless both of the following conditions are
met.
The Monitor for MVS 2.0
System Administrator’s Guide

3-19

Remote Sessions Directory

Chapter 3: Landmark Product Communication

• The product session is active and can perform Landmark
NaviGate functions (in other words, its modification level is
correct).

• At least one Landmark product communication link has been
made to the product session.

3-20

Chapter 3: Landmark Product Communication

Remote Session Definition

Remote Session Definition
JOBNAME:
SYSID :

THE MONITOR FOR MVS
VERSION: 2.0
REMOTE SESSION DEFINITION

DATE:
TIME:

COMMAND:
OVERTYPE FIELDS TO "ADD" OR "UPDATE"
PRODUCT ------->

TMONMVS

APPLID -------->

TMVSPGH

DESCRIPTION --->

TMON FOR MVS IN PITTSBURGH

PRIMARY TMP --->

N

Y = DEFAULT TMP FOR "JUMP="
N = SECONDARY TMP

============================================================================
CURSOR SELECT ONE OF THE FOLLOWING:

_ADD

HELP INFORMATION = PF1

_UPDATE

_DELETE

PF KEY ASSIGNMENTS = PA1

The Remote Session Definition screen lets you update or define
your session definitions. You can add a new definition, or update
or delete an existing one. This information includes the product
ID, the applid, and the description of the session.

Accessing this Screen

To access this screen, complete one of the following paths.

Product

Action

Displays

TMON for CICS/ESA

On the command line, enter =10.1.6 .

Remote Sessions Directory

Cursor-select an applid.

Remote Session Definition

On the command line, enter =10.1.8 .

Remote Sessions Directory

Cursor-select an applid.

Remote Session Definition

On the command line, enter =9.5.1.

Remote Sessions Directory

Cursor-select an applid.

Remote Session Definition

On the command line, enter =9.7.1.

Remote Sessions Directory

Cursor-select an applid.

Remote Session Definition

TMON for CICS/MVS
TMON for DB2
TMON for DBCTL
TMON for MQSeries
TMON for MVS

Primary Commands

On the command line, enter =9.5.1.

Remote Sessions Directory

Cursor-select an applid.

Remote Session Definition

On the command line, enter =S.1 .

Remote Sessions Directory

Cursor-select an applid.

Remote Session Definition

Enter the following commands on the command line.
ADD

The Monitor for MVS 2.0
System Administrator’s Guide

Adds a remote session definition to the
control file. Type the appropriate
information in the APPLID, DESCRIPTION,
and PRODUCT fields to identify the new
3-21

Remote Session Definition

Chapter 3: Landmark Product Communication

product session; then enter this command
(or cursor-select the ADD field).
DELETE

Deletes a remote session definition from the
control file. You also can cursor-select the
DELETE field to perform this function.

UPDATE

Updates a remote session definition in the
control file. Type over the information you
want to change; then enter this command
(or cursor-select the UPDATE field).

Use the DOWN and UP commands to scroll through this screen. To
learn about the various ways to scroll using these commands and
for syntax and descriptions of all commands, see Chapter 2 in your
product reference manual.

Fields

➥ ADD
Use this field as part of the procedure to add session definitions to
the control file. Type appropriate information in the APPLID,
DESCRIPTION, and PRODUCT fields to identify the new product
session; then cursor-select this field to add the definition to the
control file. You also can use the ADD command to perform this
function.
APPLID

Shows the 1- to 8-character applid of a Landmark product.

➥ DELETE
Cursor-select this field to delete the session definition from the
control file. Your product, however, must be re-cycled before you
see the effects of the DELETE function. You also can use the
DELETE command to perform this function.
DESCRIPTION

Displays a description of the product session. You can specify a
maximum of 36 characters in the description.
PRIMARY TMP

Specifies whether this product session is the primary session for
the Landmark product. Primary sessions are the product sessions
accessed when you enter the JUMP command to explicitly access
another Landmark product. More than one primary session can be
defined for each unique Landmark product on your system. When
more than one primary session is defined and a JUMP command is
issued, the first primary session found active is used to satisfy the
JUMP request.
The following table lists valid values.

3-22

Value

Description

N

Indicates that the product session is not the
primary session

Chapter 3: Landmark Product Communication

Remote Session Definition

Value

Description

Y

Indicates that the product session is the primary
session

PRODUCT

Shows the product for this session definition. The following table
lists valid identifiers.
Identifier

Product

TMONCICS

TMON for CICS (CICS/ESA) and
TMON for CICS (CICS/MVS)

TMONDB2

TMON for DB2

TMONDBC

TMON for DBCTL

TMONMQ

TMON for MQSeries

TMONMVS

TMON for MVS

➥ UPDATE
Use this field as part of the procedure to update session definitions
in the control file. Type over the information you want to change;
then cursor-select this field to update the session definition on the
control file. You also can use the UPDATE command to perform
this function.

The Monitor for MVS 2.0
System Administrator’s Guide

3-23

Remote Sessions Logon

Chapter 3: Landmark Product Communication

Remote Sessions Logon
JOBNAME:
SYSID :

THE MONITOR FOR MVS
VERSION: 2.0
REMOTE SESSIONS LOGON

DATE:
TIME:

COMMAND:

_
_
_
_
_
_
_
_
_
_
_
_
_

APPLID
TMDBCHI
TMVSCHI
TMON2CHI
TMDBNYC
TMVSNYC
TMON8NYC
TMDBPGH
TMVSPGH
TMON8PGH
TMON2NYC
TMDBSF
TMVSSF
TMON2SF

PRODUCT
TMONDB2
TMONMVS
TMONCICS
TMONDB2
TMONMVS
TMONCICS
TMONDB2
TMONMVS
TMONCICS
TMONCICS
TMONDB2
TMONMVS
TMONCICS

STATUS
INACT
ACTIVE
ACTIVE
ACTIVE
ACTIVE
ACTIVE
ACTIVE
ACTIVE
INACT
INACT
ACTIVE
ACTIVE
INACT

VER
03.1
02.0
02.0
03.2
02.0
08.3
03.2
02.0
08.3
02.0
03.1
01.3
02.0

DESCRIPTION
THE MONITOR
THE MONITOR
THE MONITOR
THE MONITOR
THE MONITOR
THE MONITOR
THE MONITOR
THE MONITOR
THE MONITOR
THE MONITOR
THE MONITOR
THE MONITOR
THE MONITOR

HELP INFORMATION = PF1

FOR
FOR
FOR
FOR
FOR
FOR
FOR
FOR
FOR
FOR
FOR
FOR
FOR

DB2 IN CHICAGO
MVS IN CHICAGO
CICS IN CHICAGO
DB2 IN NEW YORK
MVS IN NEW YORK
CICS IN NEW YORK
DB2 IN PITTSBURGH
MVS IN PITTSBURGH
CICS IN PITTSBURGH
CICS/ESA IN NY V2.0
DB2 IN SAN FRANCISCO
DB2 IN SAN FRANCISCO
CICS/ESA IN SAN FRANCISCO

PF KEY ASSIGNMENTS = PA1

Use the Remote Sessions Logon screen to access an applid of
another Landmark PerformanceWorks MVS product. The status of
the product you want to access must be active.

Accessing this Screen
Product

Action

Displays

TMON for CICS/ESA

On the command line, enter =9.2 .

Remote Sessions Logon

TMON for CICS/MVS

On the command line, enter =9.2

Remote Sessions Logon

TMON for DB2

On the command line, enter =9.5.2.

Remote Sessions Logon
Remote Sessions Logon

TMON for DBCTL

On the command line, enter =9.7.2.

TMON for MQSeries

On the command line, enter =9.5.2.

Remote Sessions Logon

TMON for MVS

On the command line, enter =A.1 .

Remote Sessions Logon

Primary Commands

Fields

To access this screen, complete one of the following paths.

Use the DOWN and UP commands to scroll through this screen. To
learn about the various ways to scroll using these commands and
for syntax and descriptions of all commands, see Chapter 2 in your
product reference manual.

➥ APPLID
Displays the applid of a product defined in the control file. All
applids defined in the control file are shown.
Cursor-select an applid to access the associated product. The first
screen of the selected product is displayed.

3-24

Chapter 3: Landmark Product Communication

Remote Sessions Logon

DESCRIPTION

Displays a brief description of the product with the applid shown
in the corresponding APPLID field.
PRODUCT

Displays the product for this session definition. The following
table lists valid identifiers.
Identifier

Product

TMONCICS

TMON for CICS (CICS/ESA) and
TMON for CICS (CICS/MVS)

TMONDB2

TMON for DB2

TMONDBC

TMON for DBCTL

TMONMQ

TMON for MQSeries

TMONMVS

TMON for MVS

STATUS

Indicates the status of the Landmark product. The following table
lists valid status indicators.
Status

Description

ACTIVE

The product is active.

INACT

The product is not active.

UNKNWN

The status of the product cannot be
determined.

VER

Shows the version of the Landmark product. The value in the VER
field is always zero unless both of the following conditions are met.

• The product session is active and can perform Landmark
NaviGate functions (in other words, its modification level is
correct).

• At least one Landmark product communication link has been
made to the product session.

The Monitor for MVS 2.0
System Administrator’s Guide

3-25

Chapter 3: Landmark Product Communication

3-26

Chapter 4: Support and Maintenance
The goal of Landmark’s Customer Services team is to help you
solve any problems or answer any questions that arise as you use
Landmark products or documentation.
This chapter discusses:

• Our Customer Service Satisfaction Guarantee
• Year 2000 compliance warranty
• Requesting and receiving support
• Product support policy
• How Landmark distributes product maintenance
• Electronic Customer Service system
• Proactive maintenance policy
• Hiper fix policy
• Submitting an enhancement request
• Configuration changes and disaster recovery.

Customer Service Satisfaction Guarantee
Landmark Systems Corporation is committed to providing
responsive, quality service to any customer who purchases
maintenance from us. We are committed to delivering on this
promise and, therefore, make the following guarantee:
If, in any month, the customer is not satisfied with the service received for
a Landmark product, we will give them credit for double that product’s
monthly maintenance fee.
This guarantee commences with the general availability (GA) of
any new Landmark product or the new release of any existing
Landmark product.
The following guidelines apply if you wish to invoke this
guarantee.

• We must receive a letter signed by your department manager
on your company letterhead. This letter must describe the
situation and explain the reasons for the dissatisfaction.

• Your company’s maintenance payments must be current.
Credit will be implemented as described in the following table.

The Monitor for MVS 2.0
System Administrator’s Guide

4-1

Year 2000 Compliance Warranty

Chapter 4: Support and Maintenance

Your License Agreement

Our Credit Policy

Permanent License or
Lease/Purchase

You will receive a credit for two month’s
maintenance on your next annual
maintenance invoice.

Rental

You will receive a credit for one month’s rental
upon renewal.

Year 2000 Compliance Warranty
Landmark Systems Corporation warrants that its licensed
programs are Year 2000 compliant. Year 2000 compliant means that
the licensed program, individually and in combination, shall:

• Process the date and date-related data, including but not
limited to, calculating, comparing, and sequencing

• Manipulate the date and date-related data with dates prior to,
through, and beyond January 1, 2000

• Be transparent to the user
• Correctly transition into the Year 2000 with the correct system
date without human intervention, including leap year
calculations

• Provide correct results when moving forward or backward in
time across the Year 2000.
Notwithstanding the above, it is understood that, based on IBM’s
plan to withdraw programming support for CICS/MVS 2.x and
below, VSE/ESA 1.3 and below, and CICS/VSE 2.2 and below,
Landmark has no plans to modify TMON for CICS/MVS, TMON
for VSE, or TMON for CICS/VSE, respectively, to support Year
2000 on those platforms. Landmark reserves the right to modify
these plans based on changes in IBM’s plans and Landmark’s own
business requirements.
You will have the right to perform tests that are reasonably
necessary to determine compliance with the Year 2000 compliant
warranty stated here. You may, at no additional cost, make a test
copy of the licensed programs for which you are licensed and test
such copy(s) on any platform that Landmark has indicated is
suitable for the licensed program.

Product Support
This section discusses:

• What to do before contacting Landmark
• How to request support
• Our process for providing support.

4-2

Chapter 4: Support and Maintenance

Before Contacting
Landmark

Product Support

You should define your problem, assign it a severity level
according to the guidelines in this section, and gather any
appropriate supporting documentation before you contact
Landmark for product support. When defining your problem, be
prepared to describe it as completely as possible and outline the
sequence of events that preceded it.
Use the following criteria to assign the problem a severity level.
Level

Description

SEV1

The system fails or the product is not operational when in a
business-critical application. This is the highest priority level
for a problem.

SEV2

A serious problem affects, but does not prohibit, software
operation.

SEV3

A problem affects software operation but does not prevent it.

SEV4

You have a usage question, encounter a documentation error,
or have an enhancement request. Read about submitting an
enhancement request later in this chapter.

Collect the following supporting documentation:

• All the messages you receive, including the message numbers
and text. If you receive messages from IBM or other vendors’
products, please read any available documentation related to
the messages and follow any instructions provided therein
before contacting Landmark.

• A description of your operating environment, including:
–

The version number and Performance Series for MVS or
PerformanceWorks tape identifier of the relevant Landmark
product

–

The version number of the operating system

–

The version number of other related program products,
such as VTAM, MVS, CICS, AIX, Solaris, Sybase, Oracle,
and SunOS

–

A list of all hardware components and their configuration

–

A list of any installed software changes.

• All output related to the problem, for example:

The Monitor for MVS 2.0
System Administrator’s Guide

–

Dumps and traces

–

Screen prints, particularly the Error Diagnostic Screen
(described in the next section)

–

Samples of JCL, control statements, and incorrect output
(mainframe products)

–

JES2 or OPTION LOG output (mainframe products)

–

Samples of scripts and incorrect output (distributed
products).
4-3

Product Support

Error Diagnostic
Screen

Chapter 4: Support and Maintenance

The Error Diagnostic Screen enables you to recover from an
internal error. It also provides us with the information we need to
diagnose the problem.
ERROR DIAGNOSTIC SCREEN
COMMAND:
AN ERROR HAS BEEN ENCOUNTERED IN PROGRAM $PGMCTL !!!
ANY MESSAGE INFORMATION ABOVE MAY BE RESIDUAL.
SELECT AN OPTION BELOW TO CONTINUE OR TERMINATE.
ABEND CODE 00C7
PRIMARY ASID: 00C3 SEC: 00C3
FAILING MODULE ADDRESS 0007D8D0 OFFSET: 00000628
DATA AT FAILURE POINT: 0007DEF2 E1324F0E 07740600 89000005
_VIEW PWA STORAGE CHAINS?
TMA 04FD7010 PGM $CBDSEX
PSW 078D0000 8007DEF8 PWA 001B75E8 GCA 00018000
0-7 001B7802 0001A020 0001A020 001B75E8 04FD8140 001B75E8 04FD7010 0007D8D0
8-15 0007E8D0 001B75E8 001C37F0 00162020 00018000 04FD8000 04FD7010 00000000
_CLEAN UP AND CONTINUE
_CLEAN UP WITH DIAGNOSTIC SNAP
_CLEAN UP WITH SYSTEM DUMP
HELP INFORMATION = PF1

_TERMINATE THIS SESSION
_TERMINATE WITH DIAGNOSTIC SNAP
_TERMINATE WITH SYSTEM DUMP
PF KEY ASSIGNMENTS = PA1

The screen displays several fields you can cursor-select to recover
from the error, terminate your session, or obtain information to
help resolve the problem. Either a user or a system abend code is
displayed in the ABEND CODE field. If the code begins with an
“S,” it is a system abend code.
The only way to exit this screen is to select one of the cleanup or
terminate fields at the bottom. If the problem is not a recurring
one, you should cursor-select CLEAN UP AND CONTINUE and
attempt to continue your session. If you cannot continue, cursorselect TERMINATE THIS SESSION.
Print the screen before you make your selection and contact
Customer Services or your local Landmark representative. If you
call Customer Services, a technician may ask you to cursor-select
the VIEW PWA STORAGE CHAINS? field to obtain information for
debugging the problem. If the technician needs additional
information, you may be asked to cursor-select one of the cleanup
or terminate options at the bottom of the screen to obtain a
diagnostic snap or system dump.

Requesting Support

Once you have gathered the supporting documentation for your
problem, you are ready to contact us for support. Which technician
you contact to obtain support varies, depending on where you
licensed your Landmark product and the level of support you
purchased.

• If you licensed this product outside of the U.S. or Canada,
report any problems or concerns directly to your local
Landmark representative.
4-4

Chapter 4: Support and Maintenance

Product Support

• If you licensed this product through an authorized reseller,
report any problems or concerns directly to the reseller.

• If you licensed this product directly from Landmark in the U.S.
or Canada, contact Landmark Customer Services at one of the
following numbers:

–

In the United States, the U.S. Virgin Islands, and Canada,
1-800-775-LMRK (or 1-800-775-5675)

–

1-703-464-1300

Standard operating hours are Monday through Friday from 8 a.m.
to 6 p.m. eastern standard time (EST). However, we provide
support for critical (SEV1) problems 24 hours a day, 365 days a
year. So, if you experience a SEV1 problem outside of standard
business hours, use the same telephone numbers.
If you have a password, you can request customer support through
the Internet at www.support@landmark.com. You also can
send an e-mail message to its@landmark.com or fax your
request to Customer Services at (703) 464-4901 or
1-800-257-8251.
Response Policy

Landmark Customer Services’ response policy varies depending on
the severity assigned to the problem.

SEV1 Problems

We provide support for SEV1 problems 24 hours a day, 365 days a
year. When you contact us, a technician starts working on your
problem immediately. If all technicians are busy, we will respond
to you within two hours. If you contact us after normal business
hours, you can leave a message and a technician will return the call
within two hours.

Non-SEV1
Problems

If your problem is not a SEV1 problem, a technician starts working
on your problem immediately. If all technicians are busy, we will
provide you with an activity number and respond within four
hours. If you call after normal business hours, leave a message,
and a technician will call back the next business day.

No Response

Receiving Support

If a Landmark technician attempts to contact you five or more
times, leaving messages when you are not in, and you do not
return Landmark’s call within 48 business hours, your activity is
closed. In addition, if a Landmark technician has requested
supporting documentation for the problem or is waiting for
confirmation of a problem resolution from you, and you do not
contact Customer Services within two weeks, your activity is
closed automatically.
Every time you contact Landmark Customer Services to report a
new problem or request information, a technical assistant:

• Asks for your site number and the version number of the
product on which you are reporting.

The Monitor for MVS 2.0
System Administrator’s Guide

4-5

Product Support

Chapter 4: Support and Maintenance

• Assigns an activity number to the problem. Be sure you record
the activity number and use it during follow-up
communication to ensure efficient handling of your problem.
During subsequent communication, we use your activity
number to route the communication appropriately. If you need
to forward supporting documentation to Landmark, mark the
activity number on both the contents and the outside of the
package to make sure the appropriate team member receives it.

• Asks you to provide a brief description of the problem.
A Customer Services technician asks you to describe the problem
and supply any other information that may assist in resolving it. If
the problem already has been reported and a fix is available, the
technician can mail a module replacement to you or assist you with
downloading it from the Electronic Customer Service system (ECS),
described later in this chapter. If the fix is part of a service
upgrade, the technician can order the upgrade for you.
If the problem you describe indicates a software malfunction that
does not have a fix, the technician may ask you for additional
information, including the supporting documentation discussed
earlier in this chapter.
Submitting
Documentation
to Landmark

When a problem requires further investigation, we may ask you to
send your supporting documentation to Landmark. You can either
send it via FTP to ftp.landmark.com (the quickest method) or
use the following procedures to mail it.
1.

For dumps, raw data, traces, or other large-volume printouts,
send tapes (3480 cartridges are preferred), with a description of
how you created the tape, the data set name, the record and
block sizes, and the number of files. Note that Landmark
internal software interprets unformatted SVC or console
dumps. Please do not send printed (JES offload) or formatted
dumps.
For job logs, screen prints, small snap dumps, and other small
printouts, send the original listings.

2.

Include a short note that describes the documentation you are
sending and whether you want Landmark to return it.

3.

Label each document and the outside of the package with the
assigned activity number.

4.

Send the package to:
Attention: CUSTOMER SERVICES
ACTIVITY NUMBER:
Landmark Systems Corporation
12700 Sunrise Valley Drive
Reston, Virginia 20191-5804

4-6

Chapter 4: Support and Maintenance

Note

Changing the
Priority of an
Activity

Product Support

If a Landmark technician requests your supporting documentation
and does not receive it within two weeks, your activity is closed
automatically.
If the impact of a reported problem becomes more severe, you can
escalate the priority of an activity in one of two ways:

• Although Landmark strictly follows its severity level
definitions when assigning a severity level to a problem, you
can request that your problem be given a higher priority, based
on how important resolution of the problem is to your
business. The technician documents this in the activity record
and notifies the appropriate manager. Increasing the priority
of a problem does not necessarily increase its severity level.

• Contact the following levels of management to either escalate
the priority of your activity or express any concerns you may
have: service manager, Director of Customer Services, Vice
President of Development and Customer Services, or President
of Landmark Systems Corporation. After reviewing the details
of your situation, the problem can be assigned a higher priority,
as appropriate. We use an activity’s priority to schedule
resources to resolve the problem.
If a problem becomes less severe, contact Customer Services with
the activity number and request that they assign the activity a
lower priority or close it.

Product Support
Policy
Sunset Support
Policy

Landmark fully supports the current release and one previous
release of each of its products. Landmark cannot, however,
support all releases of its products indefinitely.
Once Landmark announces the general availability (GA) of a
product release, it provides support for the previous release for a
minimum of six months. Landmark supports older releases of its
products for as long as practical, but not indefinitely.
Announcements regarding our support plans for various product
releases are made in our quarterly online newsletter, The Landmark
Monitor. Once programming support for a product release is
withdrawn, Landmark no longer supplies fixes for problems nor
accepts enhancement requests for that release.
When a vendor announces the end of support for system software
or a hardware configuration on which Landmark products rely,
Landmark will make a similar announcement to customers
regarding the support plans for its products. Landmark’s support
for problems affected by system software release levels will
terminate when the vendor no longer supports their hardware or
software.

The Monitor for MVS 2.0
System Administrator’s Guide

4-7

Product Maintenance

Premium Sunset
Support Policy

Chapter 4: Support and Maintenance

Supporting sunsetted releases is a costly practice and is impossible
for Landmark to do when the operating system or subsystem
Landmark products require to provide support are no longer
supported by their respective vendors.
Between the time Landmark sunsets a product and the time it
becomes impossible to support the release, you can request a price
for premium sunset maintenance. These additional maintenance
fees are used to cover our additional support costs, such as
maintaining old systems, and to allow more time to resolve
requests for service.
Premium sunset support contracts must be for a specified period of
time (a minimum of six months). The money-back guarantee will
not be valid if we find that we do not have the resources needed to
find solutions to problems.

Product Maintenance
This section discusses:

• How Landmark distributes maintenance
• Electronic Customer Service system
• Proactive maintenance policy
• Hiper policy
• How to submit a product enhancement request.

How Landmark
Distributes
Maintenance

We distribute our products in object code format. We do not
provide source-based code to anyone outside of Landmark. Source
code and the methodologies of data extraction are considered
proprietary information. To protect your investment and support
contractual requirements, source is archived.
We distribute maintence for our mainframe products
(PerformanceWorks for MVS and OS/390 and PerformanceWorks for
VSE) and distributed products (PerformanceWorks for Distributed
Products) as described in the following sections.

Mainframe
Products

Periodically, Landmark publishes a base Performance Series for
MVS, PerformanceWorks for MVS and OS/390, or PerformanceWorks
for VSE tape for all Landmark MVS or VSE products. For MVS
products, all installation and maintenance is performed using
SMP/E. For VSE products, we provide a single tape in unloaded
format.
Landmark also publishes MVS and VSE cumulative maintenance
(CUM) tapes periodically containing all known maintenance for the
products. The availability of all of these base and CUM tapes
ensures that you can obtain the most up-to-date release of any
Landmark MVS or VSE product.

4-8

Chapter 4: Support and Maintenance

Product Maintenance

Landmark assigns to each tape an identifier that indicates the level
of service applied. These identifiers appear on the physical tape in
either ETyyvn or PSyyvn format, as described in the following table.
Identifier Part

Description

ET

An early test tape that is created only for Alpha and Beta
products.

PS

A base tape containing products that are generally
available.

yy

The 2-digit year in which the tape was created.

v

The version number of Performance Series for MVS,
PerformanceWorks for MVS and OS/390, or
PerformanceWorks for VSE.

n

An incremental tape number that changes each time a
tape is produced.

For example, “PS9734” is the fourth base tape for PerformanceWorks
Version 3 in 1997.
When a new release or product version becomes available,
Landmark notifies our customers in The Landmark Monitor, our
online quarterly Customer Services newsletter. To access a copy of
the newsletter, use your Internet browser to go to
www.landmark.com.
For complete information on installing base tapes and for applying
maintenance from CUM tapes, read the appropriate installation
guide for your Performance Series or PerformanceWorks product.
Distributed
Products

We deliver distributed products on CD-ROM. Users under current
maintenance contracts can contact Landmark Customer Services
for support by calling 1-800-775-5675 or sending an email message
to its@landmark.com. In addition, Customer Services
periodically releases maintenance CD-ROMs and makes them
available to users under current maintenance contract.
For complete information on installing distributed products, read
the appropriate installation guide.

Electronic Customer
Service System (ECS)
Note

The Landmark ECS is currently available for direct access only to
customers in the U.S. and Canada. Other customers receive the
benefits of ECS through their local Landmark representative.
Using Landmark’s ECS, you can access product fixes 24 hours a
day, as soon as Landmark Maintenance publishes them. You also
can obtain information on product-specific issues, including
discussions of important product topics, sample programs, and
other areas of interest to Landmark customers. For complete
information on the Landmark ECS, read Electronic Customer Service

The Monitor for MVS 2.0
System Administrator’s Guide

4-9

Configuration Changes and Disaster Recovery

Chapter 4: Support and Maintenance

System User’s Guide, which is included in every product’s
documentation set.

Proactive
Maintenance Policy

If you do not want to wait until you have a problem, you have the
option of receiving product maintenance automatically. Landmark
will proactively ship new maintenance to you on a CUM tape as
soon as it is published. To receive this service, call Customer
Services at 1-800-775-5675, fax your request to 1-800-257-8251, or
send an e-mail message to its@landmark.com.

Hiper Fix Policy

When Landmark identifies a hiper problem in a product and has
developed a fix for it, we distribute notification of the problem and
the fix to all customers of that product who have current
maintenance contracts. A hiper problem is a high impact or
pervasive problem that Landmark Development has determined
can disable your operating system, subsystem, TMON product, or
critical business application. We recommend that you apply this
fix as soon as possible.

Submitting an
Enhancement Request

You can make product enhancement requests by submitting to
Landmark Customer Services a detailed written description of the
enhancement on your company letterhead. Your enhancement
request must be signed by your department manager. Once
Landmark receives the request, we assign it an activity number and
notify you. Enhancements are considered only for current,
supported releases (read the section on our product support policy
in “Product Support,” earlier in this chapter).
The request is then reviewed by the product team, which
determines whether the enhancement is accepted or not. You are
sent a letter notifying you of your request’s status. If the
enhancement request is accepted, it is placed in a pool of accepted
requests. This pool is reviewed by the product team when future
releases are being planned.
Acceptance of a request does not guarantee an enhancement’s
implementation in a specific product release. Acceptance is only an
indicator that we believe the suggestion has merit and is consistent
with the established direction of the product. When your
enhancement is incorporated into the product, you are notified by
letter of the product release that contains it.

Configuration Changes and Disaster Recovery
Landmark uses software-enabled passwords that are based on the
processor on which the Landmark product is running. If you plan
to move the product from one system to another or are forced to
move (for example, in a disaster recovery situation), you must call
to get a new product-enabling password.

4-10

Chapter 4: Support and Maintenance

Configuration Changes and Disaster Recovery

New or Replacement
Processors

Landmark requires written notification when new CPUs are
installed and new CPU serial IDs are assigned. We should receive
notification on company letterhead, describing the change to occur,
when it will occur, and the new CPU identification information.
Customers outside the U.S. and Canada should notify their local
Landmark representative.

Disaster Recovery

If you are forced to move to a disaster recovery site, you are fully
supported. If you are planning to test your disaster recovery
procedures, contact us during the planning phase to give us the
CPU identification you will be using.

• If you licensed your product directly from Landmark,
temporary passwords are available 24 hours a day, 365 days a
year following normal after-hours support procedures for
Severity 1 problems.

• If you licensed your product outside the U.S. or Canada,
contact your local Landmark representative for support.

The Monitor for MVS 2.0
System Administrator’s Guide

4-11

Chapter 4: Support and Maintenance

4-12

Appendix: TMON for MVS Sample Library
This appendix lists the members in the TMON for MVS 2.0 sample
library, in alphabetical order. A brief description of each member is
provided. For a list of members in the Strategic Services sample
library, see “Appendix C: Strategic Services Sample Library” in
PerformanceWorks for MVS and OS/390 Installation Guide.
Contents

Description

CODEFMT

Macro used to build an entry to the CODETABL CSECT for use by
TMON for MVS

TMVACF2D

Documentation for CA-ACF2 security use with TMON for MVS

TMVACF2R

Job stream used for CA-ACF2 definitions

TMVAPPL

TMON for MVS sample VTAM definition

TMVBKUP

Job stream to create a backup copy of the control record

TMVRPR01

Job stream to create a backup copy of the Landmark File Services
files

TMVRSTOR

Job stream to restore control record

TMVRWE01

Exception Summary report

TMVRWE02

Exception Detail report

TMVRWJCL

Sample JCL to execute the TMON for MVS Report Writer

TMVRWN01

Enqueue Summary report

TMVRWN02

Detail Enqueue by Major/Minor report

TMVRWP01

Demand and Total Paging Rates report

TMVRWP02

Common Storage Area Data report

TMVRWP03

Link Pack Area Data report

TMVRWP04

Private Area Data report

TMVRWP05

Page/Swap Data Set Allocation report

TMVRWP06

Logical Swap Activity report

TMVRWP07

UIC Distribution report

TMVRWP08

V:R Ratio vs. Paging Activity report

TMVRWP09

ESTORE Summary report

TMVRWP10

Logical Swap Effectiveness report

TMVRWS01

CPU Busy and Average Tasks report

TMVRWS02

System Summary report

TMVRWS03

System SRM Summary report

TMVRWS04

Average TSO Users and First Period Response report

The Monitor for MVS 2.0
System Administrator’s Guide

A-1

Appendix: TMON for MVS Sample Library

A-2

Contents

Description

TMVRWS05

Maximum and Average Batch Users

TMVRWS06

System reports

TMVRWSEL

Dummy select member

TMVSASWG

SAS workload manager goal mode reports for monitoring velocity
and response time

TMVSASWK

SAS workload manager compatibility mode report for monitoring
velocity and response time

TMVSCNTL

Job stream to copy select key ranges from one control file to
another

TMVSRMIS

Diagnostic program

TMVTSDOC

Documentation for CA-Top Secret security use with TMON for MVS

TMVWGTXT

Descriptions of the SAS workload manager goal mode reports in
member TMVSASWG

TMVWKTXT

Description of the SAS workload manager compatibility mode
report in member TMVSASWK

TMVXPAND

Sample decompression routine

Index
Numbers and Special
Characters
$DEFAULT profile, 2-7 to 2-8
$LMRKTMR resource class, 2-5
$RACFCDT member, 2-5
$RACFRTB member, 2-5
$TRACEOFF command, 2-4
$TRACEON command, 2-4
$USRPRMS member, 2-8

A
Access levels, 2-38, 2-41
Access methods, 2-15
ACF2DOC member, 2-4
ACTIVE status, 3-19, 3-25
Activity Monitor installation verification, 1-2
Activity number, 4-6
ACTIVMON function, 2-24
ACTVLOG function, 2-24
ACTVMON function, 2-24
ADD command, 2-19, 2-37, 3-21
ADD field, 2-19, 2-37, 3-22
Address of Landmark, 4-6
ADVFUNCS function, 2-24
ALTR access level, 2-38
APPL macro, 3-4, 3-7
Application IDs
identifying, 3-3
local, 3-1, 3-3
remote, 3-1
APPLID field, 3-19, 3-22, 3-24
Applids
see Application IDs
Authorized resellers, calling, 4-5

B

CDRM definition, 3-4
CDRSC definitions and parameters, 3-4
CDT
see Class descriptor table (CDT)
CHANAUTH function, 2-24
Changing problem priority, 4-7
CICSSTAT function, 2-24
Class descriptor table (CDT), 2-5
CLASS field, 2-21
CLOSEPRINT command, 2-28
CNTL access level, 2-38
CNTLFILE function, 2-24
CODE field, 2-22, 2-37
CODEFMT member, A-1
COLLANAL function, 2-24
Collection Analysis installation verification, 1-3
Commands
ADD, 3-21
DELETE, 3-22
UPDATE, 3-22
COMPROT operand, 3-7
Connection screen, 3-16
CONSOLE function, 2-24
Contacting Landmark for support, 4-3
Control file
C record, 2-1, 2-5
Internal Security specifications, 2-13
product session definitions, 3-18
profile definitions, 2-33
remote session definitions, 3-22
user definitions, 2-18
Cross-domain resource definitions, 3-4
CSMON function, 2-24
CSMONDET function, 2-24
CSMONOPT function, 2-25
CSTGSDSP function, 2-25
Cumulative maintenance tape, 4-8
CURRENT USERS field, 2-15
Customer Service Satisfaction Guarantee, 4-1

Base tape, 4-8

D

C

D function type, 2-22
DATADCTS function, 2-25
DB2AUTH function, 2-25
DB2CONN function, 2-25
DB2OPTS function, 2-25
DBCAUTH function, 2-25
Ddnames
TDBCPRMS, 3-5
TMDBPRMS, 3-5
TMONPRMS, 3-5

C record, 2-1, 2-5
CA-ACF2 security, 2-1, 2-4
CA-TOP SECRET security, 2-1, 2-4
Calling for support, 4-4
Calling Landmark Customer Services, 4-5
CANCEL function, 2-24
CCWTRACE function, 2-24
CDRDYN parameter, 3-4
The Monitor for MVS 2.0
System Administrator’s Guide

Index-1

Index

TMQSPRMS, 3-6
TMVSPRMS, 3-6
Delay Monitor installation verification, 1-4
DELETE command, 2-19, 2-37, 3-22
DELETE field, 2-19, 2-37
session definition, 3-22
DESCRIPTION field, 2-22, 2-38
product, 3-25
product session, 3-22
session definition, 3-19
Detail Profile Definition screen, 2-36 to 2-40
Directories
Profiles/Resources, 2-33 to 2-35
Remote Sessions, 3-18 to 3-20
Secured Functions, 2-21 to 2-23
User Profiles, 2-16 to 2-17
Distributed sample library, A-1
DLYGRP function, 2-25
DLYGRPG function, 2-25
DLYGRPU function, 2-25
DLYMNDET function, 2-25
DLYMON function, 2-25
Documentation
ordering more copies, iv
related manuals, iv to v
submitting comments, vi
DPAUTH function, 2-25
DSNZPDSP function, 2-25

E
ECS
see Electronic Customer Service system (ECS)
EDMSTAT function, 2-25
Electronic Customer Service system (ECS), 4-9
Enhancement requests, 4-10
Error Diagnostic Screen, 4-4
ET tapes, 4-9
Exception Monitor installation verification, 1-3
EXCPDEF function, 2-25
EXCPTDEF function, 2-26
EXCPVIEW function, 2-26
EXPLAIN function, 2-26
Explicit pass-through
accessing products, 3-10
defined, 3-1
description, 3-10 to 3-11
in Landmark PerformanceWorks MVS products, 3-1
JUMP command, 3-11
REMOTE command, 3-11
using, 3-11
see also Landmark product communication
External Security
$DEFAULT profile, 2-7
activating, 2-6 to 2-7

Index-2

description, 2-4 to 2-7
implementing CA-ACF2 security, 2-4
implementing CA-TOP SECRET security, 2-4
implementing RACF security, 2-5
switching from Internal Security, 2-5
valid combinations with other methods, 2-15

F
FACILITIES field, 2-15
FLDBANAL function, 2-26
FMPROF operand, 3-7
Function access level table, 2-41 to 2-56
Function codes, 2-24 to 2-32
FUNCTION field, 2-22, 2-38
Function IDs, 2-24 to 2-32, 2-37
Function names, 2-24 to 2-32
Function security
defining access levels of functions, 2-21
function codes and names, 2-24 to 2-32
general resource definitions, 2-5
implementing in RACF, 2-5
implementing with Internal Security, 2-36
listing product functions, 2-21
required resources, 2-24 to 2-32
specifying security type, 2-15
using Internal Security with RACF user logon
security, 2-7
Functions
defining security access levels, 2-36
resource, 2-3, 2-34
resources required, 2-24 to 2-32
system, 2-3
viewing in Internal Security, 2-21, 2-36

G
GDCOPTS function, 2-26
General resource definitions, 2-5
Graphic Monitor installation verification, 1-3
Guarantee, customer service satisfaction, 4-1

H
HELPMENU function, 2-26
HISTANL function, 2-26
HLPFLDIR function, 2-26
HLPFLDTL function, 2-26
HLPMSDIR function, 2-26
HLPSLDIR function, 2-26
HLPSLDTL function, 2-26

Index

I

J

I access method, 2-15
Implicit pass-through
defined, 3-1
description, 3-12
using, 3-12
valid product releases, 3-1
see also Landmark product communication
INACT status, 3-19, 3-25
Installation
sample library members, A-1
verification procedure checklist, 1-1
see also PerformanceWorks for MVS and OS/390
Installation Guide
Installation verification procedure (IVP)
Activity Monitor, 1-2
checklist, 1-1
Collection Analysis, 1-3
Delay Monitor, 1-4
Exception Monitor, 1-3
Graphic Monitor, 1-3
Remote Sessions, 1-4
Supertrace, 1-4
System Selection Menu, 1-1
TMON for CICS NaviGate connection, 1-5
TMON for DB2 Navigate connection, 1-6
Utilities, 1-4
Integrated PTF service, 4-8
Internal Security
access levels, 2-38
activating, 2-13, 2-15
assigning profiles to user IDs, 2-16
defining passwords for user IDs, 2-18 to 2-19
defining profiles, 2-36
defining user IDs, 2-18
description, 2-9 to 2-13
for functions with RACF user logon security, 2-7
Internal Security user ID and profile table, 2-10 to
2-12
listing profiles and resources, 2-33
setting function access levels, 2-36
steps to implement, 2-13
supplied user IDs and profiles, 2-10
switching to External Security, 2-5
valid combinations with other methods, 2-1, 2-15
viewing product functions, 2-21, 2-36
IODVHIST function, 2-26
IOMON function, 2-26
IOPSTART function, 2-26
IVP
see Installation verification procedure (IVP)

J function type, 2-22
JOBLIST function, 2-26
JOBSUMM function, 2-27
JUMP command, 3-11

The Monitor for MVS 2.0
System Administrator’s Guide

L
Landmark
address, 4-6
product support policy, 4-7
Landmark Customer Services
contact procedures, 4-5
phone numbers, 4-5
response policy, 4-5
Landmark product communication
access methods, 3-1
adjusting SLU session ID prefix, 3-9
correct product releases, 3-10
defining product sessions, 3-9
description, 3-1 to 3-26
error messages, 3-3
explicit pass-through, 3-1, 3-10 to 3-11
identifying primary sessions, 3-8
implicit pass-through, 3-1, 3-12
NaviGate, 3-1, 3-13 to 3-17
non-SNA terminal network requirements, 3-8
product identifiers, 3-19, 3-23, 3-25
security considerations, 3-9
setting up, 3-3
LMRKMTB member, 3-7
LO-ACCESS LEVELS-HI field, 2-38
Local applids
defined, 3-1
verifying installation of, 3-3
Local Landmark representatives, calling, 4-4
Local products, 3-1
LOGMODE operand, 3-7
Logon mode table, 3-7
LOGOSCRN function, 2-27

M
M function type, 2-22
Maintenance, 4-8 to 4-9
Manual
audience, iii
ordering, iv
submitting comments, vi
Master user IDs, 2-10
MAXBFRU parameter, 3-8
MAXDATA parameter, 3-8
Maximum number of users, 2-15
MAXIMUM USERS field, 2-15

Index-3

Index

MAXUSER command, 2-15
MDFPRSM function, 2-27
Members
LMRKMTB, 3-7
TCEVTAM, 3-5 to 3-6
TDBCPRMS, 3-5
TDBCVTAM, 3-6
TDBPARM, 3-5
TMDBVTAM, 3-6
TMON8VTM, 3-5 to 3-6
TMONAPPL, 3-6
TMQSPARM, 3-6
TMQSVTAM, 3-6
TMVSPARM, 3-6
MODSTOR function, 2-27
MODTAB option, 3-7
MONCNTL function, 2-27
MONINIT function, 2-27
MSGAUTH function, 2-27
MVSCONTN function, 2-27

N
N access method, 2-15
N function type, 2-22
NAMLAUTH function, 2-27
NaviGate
accessing all screens, 3-17
available product connections, 3-2
connection screen, 3-16
definition, 3-2
description, 3-13 to 3-17
STAY command, 3-17
using, 3-16
see also Landmark product communication
NaviGate connections
from TMON for CICS/ESA, 3-13
from TMON for CICS/MVS, 3-14
from TMON for DB2, 3-15
from TMON for DBCTL, 3-15
from TMON for MQSeries, 3-16
from TMON for MVS, 3-16
TMON for CICS installation verification, 1-5
TMON for DB2 installation verification, 1-6
Network requirements for non-SNA terminals, 3-8
NONE access level, 2-38
Notational conventions, iii
Number of current users, 2-15

O
ONLINANL function, 2-27
OPENMAIN function, 2-27

Index-4

P
PASSTHRU function, 2-27
PASSWORD field, 2-19
Passwords for user IDs, 2-19
PERFORM function, 2-27
PFKDEF function, 2-27
PFKEYS function, 2-27
PGSETDSP function, 2-27
Phone numbers, Landmark Customer Services, 4-5
PLANSUMM function, 2-27
Policies
hiper, 4-10
premium sunset support policy, 4-8
proactive maintenance, 4-10
product support, 4-7
response, 4-5
PRIMARY field, 2-22
PRIMARY RESOURCE field, 2-34, 2-38
Primary resources
defined, 2-3
identified by function, 2-22
in profile definitions, 2-34, 2-38
Primary sessions
defining, 3-22
identifying, 3-8
PRIMARY TMP field, 3-22
PRIMARY/SECONDARY RESOURCE field, 2-22
PRINT command, 2-28
PRINTOFF command, 2-28
PRINTON command, 2-28
PRIPROT operand, 3-7
PROBALRT function, 2-27
Problem severity levels
changing, 4-7
defined, 4-3
PROCAUTH function, 2-27
PRODPSWG function, 2-27
Product
maintenance, 4-8 to 4-9
support policy, 4-7
PRODUCT field, 3-19, 3-23, 3-25
Product identifiers, 3-19, 3-23, 3-25
Product sessions
adding session definitions, 3-22
defining, 3-9
deleting sessions definitions, 3-22
updating session definitions, 3-23
PROFDTL function, 2-28
PROFILE field, 2-39
PROFILE ID field, 2-16, 2-34
PROFILE NAME field, 2-19
Profiles
defining to Internal Security, 2-14, 2-36
description, 2-2
identifying to RACF, 2-6

Index

listing in Internal Security, 2-33
multiple resources, 2-33, 2-36
specifying ID, 2-36
viewing user IDs associated with, 2-17
PROFILES/RESOURCES DIRECTORY option, 2-14
Profiles/Resources Directory screen, 2-33 to 2-35
PRTAUTOF function, 2-28
PRTAUTON function, 2-28
PRTCLOSE function, 2-28
PRTCMD function, 2-28
PRTDFDSN function, 2-28
PRTDFSYS function, 2-28
PRTDFVTM function, 2-28
PRTMENU function, 2-28
PRTSTART function, 2-28
PRTSTOP function, 2-28
PS tapes, 4-9
PSERVIC operand, 3-7
PTF service, 4-8

Q
QAUTH function, 2-28
QMGRAUTH function, 2-28
QMGREVNT function, 2-28
QMGROPTS function, 2-28
QMGRSEC function, 2-28

R
RACF security
$DEFAULT profile, 2-7
$RACFCDT member, 2-5
$RACFRTB member, 2-5
access lists, 2-5
activating, 2-6 to 2-7
class descriptor table, 2-5
external, 2-1
for functions, 2-5
for user logon, 2-5
general resource definitions, 2-5
identifying internal security profiles, 2-7
router table, 2-5
sample function general resource definitions, 2-6
steps to implement, 2-5
RACFGDF member, 2-6
READ access level, 2-38
Receiving support, contact procedures, 4-5
Remote applids
defined, 3-1
setting up and verifying cross-domain
communications, 3-4
REMOTE command, 3-11
Remote products, 3-1
Remote Session Definition screen, 3-21 to 3-23

The Monitor for MVS 2.0
System Administrator’s Guide

Remote Sessions Directory screen, 3-18 to 3-20
Remote Sessions installation verification, 1-4
Remote Sessions Logon screen, 3-24 to 3-25
Resource functions
defined, 2-3
in security definitions, 2-33
Response policy, 4-5
RESRCDSP function, 2-28
RMTPTDEF function, 2-28
RMTPTSEL function, 2-28
Router table, 2-5
RUSIZES operand, 3-7

S
S access method, 2-15
Sample library, A-1 to A-2
SAVESQL function, 2-29
SECFUNCS function, 2-29
SECFUNDF function, 2-29
SECONDARY field, 2-23
Secondary logical units (SLUs)
adjusting session ID prefix, 3-9
defining, 3-4
names, 3-6
session ID prefix, 3-6
SECONDARY RESOURCE field, 2-34, 2-39
Secondary resources
defined, 2-3
identified by function, 2-23
in profile definitions, 2-34, 2-39
Secondary sessions, 3-8
SECPROT operand, 3-7
SECURED FUNCTIONS DIRECTORY option, 2-14
Secured Functions Directory screen, 2-21 to 2-23
Security
access levels, 2-4, 2-38, 2-41
access methods, 2-15
CA-ACF2, 2-1
CA-TOP SECRET, 2-1
check, 2-3
checking definitions for product sessions, 3-9
defining, 2-1 to 2-56
description, 2-1 to 2-56
diagram, 2-2 to 2-3
facility or function, 2-1
methods, 2-1
primary resources, 2-3
profiles, 2-2
RACF, 2-1, 2-4 to 2-5
restoring distributed version, 2-1, 2-5
secondary resources, 2-3
specifying security types, 2-14
trace facility, 2-4
user logon, 2-1

Index-5

Index

valid type combinations, 2-1
see also External, Internal, and User Exit Security
Security Definitions Menu screen, 2-14 to 2-15
SECURITY function, 2-29
SECURITY METHOD ACTIVE field, 2-15
SELUSRID function, 2-29
SETAUTH function, 2-29
SEV1 severity level, 4-3
SEV2 severity level, 4-3
SEV3 severity level, 4-3
SEV4 severity level, 4-3
Severity 1 problems, 4-3
Severity 2 problems, 4-3
Severity 3 problems, 4-3
Severity 4 problems, 4-3
Severity levels
changing, 4-7
defined, 4-3
SHADOWREFRESH command, 2-29
SHDWFRSH function, 2-29
SHIFTDEF function, 2-29
SHUTDOWN function, 2-29
SIGNON function, 2-29
SLU APPLID PREFIX field, 3-19
SLUCOUNT startup parameter, 3-5
SLUs
see Secondary logical units (SLUs)
SNA type-2 logical units, 3-7
SQLCCPA function, 2-29
SQLCGDF function, 2-29
SQLTEXT function, 2-30
SSCP tables, 3-4
STARTPRINT command, 2-28
Startup parameters, SLUCOUNT, 3-5
STATUS field, 3-19, 3-25
STAY command, 3-17
STGCAUTH function, 2-30
STOPPRINT command, 2-28
STORANAL function, 2-30
STORTCBS function, 2-30
STORTIOT function, 2-30
STRGALTR function, 2-30
STRGDSPY function, 2-30
STRGNPRV function, 2-30
STRGPRV function, 2-30
STUNLOAD function, 2-30
Submitting
documentation to Landmark, 4-6
enhancement requests, 4-10
Sunset support policy, 4-7
SUPERTDM function, 2-30
Supertrace installation verification, 1-4
SUPERTRC function, 2-30
SUPERTSD function, 2-30
Support and maintenance, 4-1 to 4-12
SVCDUPD function, 2-30

Index-6

SYS1.VTAMLST data set, 3-4
SYSADM function, 2-30
SYSADMIN function, 2-30
System functions
defined, 2-3
in security definitions, 2-33
System Selection Menu installation verification, 1-1
System Services Control Point (SSCP) tables, 3-4

T
T function type, 2-22
Tables
function access level, 2-41 to 2-56
function code table, 2-24 to 2-32
Internal Security user ID and profile, 2-10
RACF class descriptor, 2-5
RACF router, 2-5
user logon/function security type, 2-1
TASKCANC function, 2-30
TCEPARM ddname, 3-5
TCEVTAM member, 3-5 to 3-6
TDBCPRMS DD statement, 2-9
TDBCPRMS ddname, 3-5
TDBCPRMS member, 3-5
TDBCVTAM member, 3-6
TDBPARM member, 3-5
Terminal (non-SNA) network requirements, 3-8
THRDAUTH function, 2-31
TMDBPRMS DD statement, 2-9
TMDBPRMS ddname, 3-5
TMDBVTAM member, 3-6
TMON for MVS
installation verification procedure, 1-1 to 1-8
ordering additional documentation, iv
sample library, A-1 to A-2
submitting comments, vi
TMON8PRM ddname, 3-5
TMON8VTM member, 3-5 to 3-6
TMONAPPL member, 3-6
TMONCICS product identifier, 3-19, 3-23, 3-25
TMONDB2 product identifier, 3-19, 3-23, 3-25
TMONDBC product identifier, 3-19, 3-23, 3-25
TMONMQ product identifier, 3-19, 3-23, 3-25
TMONMVS product identifier, 3-19, 3-23, 3-25
TMONPRMS DD statement, 2-9
TMQSPARM member, 3-6
TMQSPRMS DD statement, 2-9
TMQSPRMS ddname, 3-6
TMQSVTAM member, 3-6
TMVSAMP members, A-1
TMVSPARM member, 3-6
TMVSPRMS DD statement, 2-9
TMVSPRMS ddname, 3-6
Trace facility, 2-4

Index

TSDOC member, 2-4
TSPROF operand, 3-7
TYPE field, 2-23
TYPE VALUES field, 2-23

U
U access method, 2-15
UACC parameter, 2-6
UNITSZ parameter, 3-8
UNKNWN status, 3-19, 3-25
UPDATE command, 2-19, 2-37, 2-40, 3-22
UPDATE field, 2-19, 2-40, 3-23
UPDT access level, 2-38
User Definition screen, 2-18 to 2-20
User Exit Security
activating, 2-8, 2-13
description, 2-8
steps to implement, 2-8
user exits, 2-8
valid combinations with other methods, 2-15
USER FULL NAME field, 2-20
USER ID field, 2-17
User IDs
assigning profiles, 2-18
defining to Internal Security, 2-10 to 2-12, 2-18
listing in Internal Security, 2-16
specifying passwords in Internal Security, 2-18
USER LOGON field, 2-15
User logon security
description, 2-1
general resource definitions, 2-5
implementing in RACF, 2-5
implementing with Internal Security, 2-9 to 2-13
listing user IDs and profiles, 2-16
specifying security type, 2-15
USER NAME field, 2-17
USER PROFILES DIRECTORY option, 2-14
User Profiles Directory screen, 2-16 to 2-17
USERCMDS function, 2-31
USERDEF function, 2-31
USERDIR function, 2-31
USEREXIT parameter, 2-9
USERID field, 2-20
USERPROF function, 2-31
UTILAPFL function, 2-31
UTILASMB function, 2-31
UTILDASD function, 2-31
UTILDDSL function, 2-31
UTILDSNI function, 2-31
UTILDSNU function, 2-31
UTILFSPC function, 2-31
UTILIOSB function, 2-31
Utilities installation verification, 1-4

The Monitor for MVS 2.0
System Administrator’s Guide

UTILJOBB function, 2-31
UTILJOBS function, 2-31
UTILJPGN function, 2-31
UTILJTRM function, 2-31
UTILLNKL function, 2-31
UTILLPAL function, 2-31
UTILMENU function, 2-31
UTILMON function, 2-32
UTILMSTG function, 2-32
UTILMVSB function, 2-32
UTILSRMB function, 2-32
UTILSSVC function, 2-32
UTILSWAP function, 2-32
UTILVMNT function, 2-32
UTILVOLU function, 2-32
UTILVSMB function, 2-32

V
V function type, 2-23
VBUILD macro, 3-4
VER field, 3-19, 3-25
VTAM
application IDs, 3-1, 3-3
cross-domain communications, 3-4
logon mode table, 3-7
secondary logical units (SLUs), 3-4
SNA type-2 logical units, 3-7

W
WKLDDEF function, 2-32
WRKBENCH function, 2-32

X
X access method, 2-15
XCFMON function, 2-32

Y
Year 2000 compliance, 4-2

Index-7

Index

Index-8



Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.2
Linearized                      : Yes
Create Date                     : 1999:06:21 06:51:05
Producer                        : Acrobat Distiller 3.0 for Windows
Title                           : The Monitor for MVS 2.0 System Administrator's Guide
Author                          : Landmark Systems Corporation
Modify Date                     : 1999:06:22 12:27:23
Page Count                      : 120
Page Mode                       : UseOutlines
EXIF Metadata provided by EXIF.tools

Navigation menu