On Wed, 3 Mar 2021, at 20:22, Itschak Mugzach wrote:

> I read the doc. It describes ACF2 coverage for UADS functionality. But what
> happens if ACF2 refuses to start? 

Back out whatever you changed since it last worked?

Even if you can get around the UADS issue, /surely/ you would not run a 
real system without ACF2 being active?

I have some sort of recollection of ACF2 using WTORs to seek decisions
on things, if it's not working - though presumably means some part of it
(hooks?) are active.  

But if ACF2 isn't there to enforce all your security issues, I don't see how 
you can safely run a system at all.  How would you protect your datasets
and other resources?

-- 
Jeremy Nicoll - my opinions are my own.

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to