Using the TSSSIM Utility

Use TSSSIM to test permissions on the Security File without affecting the production environment. For example simulate FAIL mode processing while the system is in DORMANT mode.
ctsfz
Use TSSSIM to test permissions on the Security File without affecting the production environment. For example simulate FAIL mode processing while the system is in DORMANT mode.
Testing of the security permissions consists of invoking a simulation resource command (or one of the simulator's TSO/SPF panels) for the desired resource. TSSSIM reports whether the currently active simulated ACID has access to the resource under the conditions specified by the administrator. Resource qualifying conditions that may be simulated include SVC-in-control, access level, and privileged program.
The simulator can "debug" errors in the Security File permissions. Often, when a user has several profiles attached to his ACID, it is difficult to isolate which permission has allowed or denied access to a resource. By interpreting trace information generated by the security algorithm, TSSSIM can isolate the exact permission or ownership as well as indicate which record (user, profile, or all) contained the permission.
TSSSIM can be executed under:
  • TSO (both SPF and non-SPF environments)
  • BATCH
  • CA-Roscoe®
Authority and Scope
TSSSIM is available for administrators with the authority:
TSS ADMIN(acidname) MISC1(TSSSIM)
A user with no administrative authority may use TSSSIM if given USE access to entity TSSUTILITY.TSSSIM in the CASECAUT resource class. This access may be granted by an administrator using the following command:
TSS PERMIT(user) CASECAUT(TSSUTILITY.TSSSIM) ACCESS(USE)
A simulated signon can be initiated for any ACID in the Security File, including those not within the administrator's scope.
If an ACID:
  • Is within the administrator's scope, he may issue resource checks against any resource in the Security File
  • Is not within the administrator's scope, he may issue resource checks against only those resources within his scope