× The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.



Well I tried the trace that Chuck suggested and I have a 1739 page report for all of the trace. However, when I tried to print only for the specific job, I get no information available.
Then I looked at the reference Chuck suggested in another post and found a reference from Scott that told the specific items to check when using WRKFCNUSG FCNID(QIBM_QTMF*). When I looked at the initiate item I found that the default authority is *denied. So I added the user to the *allowed profiles and tried the job again. Jeff will have to tell us later if anything reached his machine.
I also tried to set logging to get a job log but haven't had success just changing the job description so I'm suspicious that the logging from the job description is overridden somewhere in their programs.
Jeff and I will have to revisit this again.

As always, if there are any questions, please let me know.

Thanks to all,

Dave Boettcher

If you really want to do something, you'll find a way; if you don't, you'll find an excuse.


-----Original Message-----
From: midrange-l-bounces@xxxxxxxxxxxx [mailto:midrange-l-bounces@xxxxxxxxxxxx] On Behalf Of CRPence
Sent: Thursday, March 06, 2014 2:15 PM
To: midrange-l@xxxxxxxxxxxx
Subject: Re: TCP3C8A Operation not authorised

On 06-Mar-2014 10:29 -0800, Jeff Bull wrote:
TCP3C8A Diagnostic 30 03/06/14 11:08:32.145896
QTMFCLIE QTCP *STMT QTMFCLIE QTCP *STMT
From module . . . . . . . . : QTMFUTIL
From procedure . . . . . . : qtmf_IssueMessage__FPcT1ie
Statement . . . . . . . . . : 351
To module . . . . . . . . . : QTMFCLIE
To procedure . . . . . . . : main
Statement . . . . . . . . . : 658
Message : Operation not authorized.
Recovery: See your system administrator or security officer.

I have a remote user trying to use an FTP script, for ALL the other
remote users it logs onto my server, PUTs a file on my system and
QUITs.
This one user gets this message in their joblog when they try to do
the exact same thing ... five attempts than abends.
I have googled the TCP3C8A but the webpage that comes up is less use
than a chocolate tea-pot.

I need a large can of inspiration if someone can supply?

The failing request with effective symptom string msgTCP3C8A f/QTMFCLIE fm/QTMFUTIL t/QTMFCLIE tm/QTMFCLIE tp/main stmt/658 indicates that the FTP *client* utility is diagnosing the condition. Per "FTP script" I presume the input and output are overridden to files... but no description of what\whether output was produced.? If the user issues the STRTCPFTP request at the command-line, does the message appear immediately or does the user actually get an interactive FTP session started? If failing immediately, then is that diagnostic followed by an Escape, and is part of what is described as the 'script' actually run as a CLP that retries up to four more times if the request fails with any/that escape message?

FWiW, IMO, Sometimes starting with the midrange archives can be better than a wider web search; e.g. the following archived message, and others in that message thread, may be of interest, and even parallel mostly what has been offered in the current message thread albeit possibly more specific direction:
http://archive.midrange.com/midrange-l/200706/msg01201.html


As an Amazon Associate we earn from qualifying purchases.

This thread ...

Replies:

Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.