On Wed, 3 Mar 2021, at 20:22, Itschak Mugzach wrote: > I read the doc. It describes ACF2 coverage for UADS functionality. But what > happens if ACF2 refuses to start?
Back out whatever you changed since it last worked? Even if you can get around the UADS issue, /surely/ you would not run a real system without ACF2 being active? I have some sort of recollection of ACF2 using WTORs to seek decisions on things, if it's not working - though presumably means some part of it (hooks?) are active. But if ACF2 isn't there to enforce all your security issues, I don't see how you can safely run a system at all. How would you protect your datasets and other resources? -- Jeremy Nicoll - my opinions are my own. ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [email protected] with the message: INFO IBM-MAIN
