The issue here is fallback. Not production run. *| **Itschak Mugzach | Director | SecuriTeam Software **|** IronSphere Platform* *|* *Information Security Continuous Monitoring for Z/OS, zLinux and IBM I **| *
*|* *Email**: [email protected] **|* *Mob**: +972 522 986404 **|* *Skype**: ItschakMugzach **|* *Web**: www.Securiteam.co.il **|* On Wed, Mar 3, 2021 at 10:29 PM Jeremy Nicoll <[email protected]> wrote: > On Wed, 3 Mar 2021, at 20:22, Itschak Mugzach wrote: > > > I read the doc. It describes ACF2 coverage for UADS functionality. But > what > > happens if ACF2 refuses to start? > > Back out whatever you changed since it last worked? > > Even if you can get around the UADS issue, /surely/ you would not run a > real system without ACF2 being active? > > I have some sort of recollection of ACF2 using WTORs to seek decisions > on things, if it's not working - though presumably means some part of it > (hooks?) are active. > > But if ACF2 isn't there to enforce all your security issues, I don't see > how > you can safely run a system at all. How would you protect your datasets > and other resources? > > -- > Jeremy Nicoll - my opinions are my own. > > ---------------------------------------------------------------------- > For IBM-MAIN subscribe / signoff / archive access instructions, > send email to [email protected] with the message: INFO IBM-MAIN > ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [email protected] with the message: INFO IBM-MAIN
