Oh my gosh, I thought we were the last company to convert from UADS to external security (TSS last year). It's mystifying why anyone would "outvote" you on this count. We were years and years overdue but we're certainly not looking back.
I've done several of these conversions, each with the popular 3 ESMs, all but the last were easy, transparent, and gradually phased in. My sympathies, tb -----Original Message----- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of Craig Kittendorf Sent: Thursday, June 02, 2005 12:00 PM To: IBM-MAIN@BAMA.UA.EDU Subject: Re: Userids No, it is not necessary to maintain UADS for users defined in Top Secret. There is even a provided utility to convert your UADS to TSS. Once a TSO segment is added to a TSS acid, if the user is defined in UADS, it will be ignored for that acid. There are some functions which can not be permitted using UADS. Craig -----Original Message----- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of Low, David Sent: Thursday, June 02, 2005 12:50 PM To: IBM-MAIN@BAMA.UA.EDU Subject: Re: Userids > John Eels queried why we are still using UADS? I tried to convert to > using our security software, but, was outvoted. My boss asked me about this the other day. We have Top Secret yet we have been maintaining UADS for all our userids. Is this unnecessary? I guess I should go RTF TSS manuals. Dave Low ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html