Oh my gosh, I thought we were the last company to convert from UADS to
external security (TSS last year).  It's mystifying why anyone would
"outvote" you on this count.  We were years and years overdue but we're
certainly not looking back.

I've done several of these conversions, each with the popular 3 ESMs, all
but the last were easy, transparent, and gradually phased in.

My sympathies,
tb

 

-----Original Message-----
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf
Of Craig Kittendorf
Sent: Thursday, June 02, 2005 12:00 PM
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: Userids

No, it is not necessary to maintain UADS for users defined in Top Secret.
There is even a provided utility to convert your UADS to TSS.  Once a TSO
segment is added to a TSS acid, if the user is defined in UADS, it will be
ignored for that acid.

There are some functions which can not be permitted using UADS.

Craig

-----Original Message-----
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf
Of Low, David
Sent: Thursday, June 02, 2005 12:50 PM
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: Userids

> John Eels queried why we are still using UADS?  I tried to convert to 
> using our security software, but, was outvoted.

My boss asked me about this the other day.  We have Top Secret yet we have
been maintaining UADS for all our userids.  Is this unnecessary?  I guess I
should go RTF TSS manuals.

Dave Low

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions, send email
to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the
archives at http://bama.ua.edu/archives/ibm-main.html

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to