------------------------<snip>------------------------
At my last place, we had about 4400 users and we split them by
departmental function. OPS got "COPY###", etc., using employee
numbers in the ### field.
The vast majority of our users were customers who selected their own
ID's and we split them alphabetically across several other small
catalogs.
(Most of their usage was CICS.)
Rick,
Just out of curiosity, by doing that wasn't it difficult to write
security rules?
---------------------------<unsnip>---------------------------
Not at all. Most security was done via RACF GROUPS, rather than
individual users. Datasets and CICS transactions followed many of the
same rules.
----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html