Suppose the sysplex consists of two systems, SYSA and SYSB, with an Application Performance Analyzer instance on each system, CAZA and CAZB, respectively. Both systems are valid targets for both CAZA and CAZB.
CAZA.VIEW.USER123
CAZA.MEASURE.JOB.JOB123
CAZB.VIEW.USER123
CAZB.MEASURE.JOB.JOB123
CAZRACON STCID=CAZA
SYSNAMES=(SYSA,SYSB)
CLASS=CAZCLASS
DSN=CAZA.COMMANDS
the following output is written to
data set tsoprefix.CAZA.COMMANDS:
(INSERT JOB CARD)
//*
//* Create RACF Profiles for Sysplex security enhancements.
//*
//TSO EXEC PGM=IKJEFT01,DYNAMNBR=20
//SYSTSPRT DD SYSOUT=*
//SYSPRINT DD SYSOUT=*
//SYSUDUMP DD SYSOUT=*
//SYSTSIN DD *
RDEF CAZCLASS SYSA.VIEW.USER123 FROM(CAZA.VIEW.USER123) -
FCLASS(FACILITY)
RDEF CAZCLASS SYSB.VIEW.USER123 FROM(CAZA.VIEW.USER123) –
FCLASS(FACILITY)
RDEF CAZCLASS SYSA.MEASURE.JOB.JOB123 FROM(CAZA.MEASURE.JOB.JOB123) -
FCLASS(FACILITY)
RDEF CAZCLASS SYSB.MEASURE.JOB.JOB123 FROM(CAZA.MEASURE.JOB.JOB123)-
FCLASS(FACILITY)
/* RDEL FACILITY CAZA.VIEW.USER123
/* RDEL FACILITY CAZA.MEASURE.JOB.JOB123
/*
//
CAZRACON STCID=CAZB
SYSNAMES=(SYSA,SYSB)
CLASS=CAZCLASS
DSN=CAZB.COMMANDS
the following output is written to
data set tsoprefix.CAZB.COMMANDS:
(INSERT JOB CARD)
//*
//* Create RACF Profiles for Sysplex security enhancements.
//*
//TSO EXEC PGM=IKJEFT01,DYNAMNBR=20
//SYSTSPRT DD SYSOUT=*
//SYSPRINT DD SYSOUT=*
//SYSUDUMP DD SYSOUT=*
//SYSTSIN DD *
RDEF CAZCLASS SYSA.VIEW.USER123 FROM(CAZB.VIEW.USER123) -
FCLASS(FACILITY)
RDEF CAZCLASS SYSB.VIEW.USER123 FROM(CAZB.VIEW.USER123) –
FCLASS(FACILITY)
RDEF CAZCLASS SYSA.MEASURE.JOB.JOB123 FROM(CAZB.MEASURE.JOB.JOB123) -
FCLASS(FACILITY)
RDEF CAZCLASS SYSB.MEASURE.JOB.JOB123 FROM(CAZB.MEASURE.JOB.JOB123)-
FCLASS(FACILITY)
/* RDEL FACILITY CAZB.VIEW.USER123
/* RDEL FACILITY CAZB.MEASURE.JOB.JOB123
/*
//
Notice that there are RDEF commands in each output data set for the same profiles from two different sources. If the source profiles have the same authorization lists, then either can be used; otherwise, you need to determine which commands to use and whether any changes to the authorization lists are required.