OK, it's time to speak up on behalf of us mossback Luddites who are still
mired in UADS. The reasons for not converting to modern methods may be
BUSINESS rather than technology oriented. I don't doubt that any number of
mechanisms exist to turn a particular SYS1.UADS into (say) RACF TSO
segments. That takes care of Day 1 of the New Era. How about Day 2, Day
200, etc. In other words, how do you manage RACF defined userids?

- Create new
- Modify existing
- Query
- Delete

For both Create and Modify, you have several 'attributes' to deal with:

- Account numbers
- Logon procs
- Authority to submit jobs, force a tape mount under TSO, or use the TSO
OPER command

For Query, you have the problem of displaying all of the above 'attributes'
of a userid in a succinct and intelligible manner. As much as we all like
to dis UADS, all of this information lives in one spot: the userid entry.
In a single LIST command, you can see everything at a glance.

With RACF TSO segments, this stuff lives all over the map. Relatively
little resides in the segment itself; most is expressed as PERMIT authority
to profiles in a menagerie of classes, some of which are mercifully obvious
(TSOAUTH TSOPROC), while others force you to memorize (ACCTNUM).

None of this is beyond the realm of comprehension or manipulation, but you
have to build a business case for converting. 'Modern' doesn't fly very far
in persuading *other* people to spend time and money on a project. For
example, we currently have an elaborate process to manage userids across
multiple platforms. To switch from UADS to RACF segments, that process
would have to be modified extensively. (The line between 'elaborate' and
'labyrinthine' is fuzzy.) What's the motivation? Who foots the bill for
conversion and training?

In a previous shop, each application programmer had lots of account numbers
to track time spent on various projects. With UADS, we could see at a
glance which projects (account numbers) a userid was authorized for. That
simple query in the world of TSO segments is a programming exercise.

None of this is a hard case for sticking with UADS. Just an observation
that failure to convert is not necessarily silly or Neanderthal.

.
.
.
JO.Skip Robinson
Southern California Edison Company
SHARE MVS Program Co-Manager
626-302-7535 Office
323-715-0595 Mobile
[EMAIL PROTECTED]

IBM Mainframe Discussion List <[email protected]> wrote on 06/02/2005
18:19:11:

> Oh my gosh, I thought we were the last company to convert from UADS to
> external security (TSS last year).  It's mystifying why anyone would
> "outvote" you on this count.  We were years and years overdue but we're
> certainly not looking back.
>
> I've done several of these conversions, each with the popular 3 ESMs, all
> but the last were easy, transparent, and gradually phased in.
>
> My sympathies,

<snip>

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to