Itschak,  Your post piqued my interest, but it’s around 35 years since I
was actually involved in RACF, ACF2, TSS and some other non-starters.

I can’t really help further.  Sorry!

On Wed, Mar 3, 2021 at 15:23 Itschak Mugzach <
[email protected]> wrote:

> John,
>
> I read the doc. It describes ACF2 coverage for UADS functionality. But what
> happens if ACF2 refuses to start? In RACF, the UADS dataset is saved in
> RCVTUADS. I looked at ACCVT mapping macro and there is no such field.
>
> ITschak
>
> *| **Itschak Mugzach | Director | SecuriTeam Software **|** IronSphere
> Platform* *|* *Information Security Continuous Monitoring for Z/OS, zLinux
> and IBM I **|  *
>
> *|* *Email**: [email protected] **|* *Mob**: +972 522 986404 **|*
> *Skype**: ItschakMugzach **|* *Web**: www.Securiteam.co.il  **|*
>
>
>
>
>
> On Wed, Mar 3, 2021 at 8:47 PM John Lock <[email protected]> wrote:
>
> > Some ancient info here .......
> >
> >
> http://vtda.org/docs/computing/IBM/Mainframe/MainframeSecurity/198501_Access%20Control%20Facility%20General%20Information%20Manual.pdf
> >
> >
> > On Wed, Mar 3, 2021 at 13:40 Itschak Mugzach <
> > [email protected]> wrote:
> >
> > > UADS is in a bypass state. However, I still wonder what happens if ACF2
> > > fails to start and we need to authenticate with UADS. Where is the UADS
> > > dataset name saved? I don't think we can access the MSTRJCL data area
> (I
> > > don;r think it is documented anywhere).
> > >
> > > *| **Itschak Mugzach | Director | SecuriTeam Software **|** IronSphere
> > > Platform* *|* *Information Security Continuous Monitoring for Z/OS,
> > zLinux
> > > and IBM I **|  *
> > >
> > > *|* *Email**: [email protected] **|* *Mob**: +972 522 986404
> > **|*
> > > *Skype**: ItschakMugzach **|* *Web**: www.Securiteam.co.il  **|*
> > >
> > >
> > >
> > >
> > >
> > > On Wed, Mar 3, 2021 at 8:19 PM Jeremy Nicoll <
> > > [email protected]>
> > > wrote:
> > >
> > > > On Wed, 3 Mar 2021, at 17:11, ITschak Mugzach wrote:
> > > > > I looked at RCVT in an ACF2 system, but the RCVTUADS is nullified.
> > How
> > > > can
> > > > > I locate the active UADS in this case?
> > > >
> > > > What would a UADS be used for on such a system?
> > > >
> > > > Wouldn't everything user-related be under ACF2 control?
> > > >
> > > > --
> > > > Jeremy Nicoll - my opinions are my own.
> > > >
> > > >
> ----------------------------------------------------------------------
> > > > For IBM-MAIN subscribe / signoff / archive access instructions,
> > > > send email to [email protected] with the message: INFO
> IBM-MAIN
> > > >
> > >
> > > ----------------------------------------------------------------------
> > > For IBM-MAIN subscribe / signoff / archive access instructions,
> > > send email to [email protected] with the message: INFO IBM-MAIN
> > >
> >
> > ----------------------------------------------------------------------
> > For IBM-MAIN subscribe / signoff / archive access instructions,
> > send email to [email protected] with the message: INFO IBM-MAIN
> >
>
> ----------------------------------------------------------------------
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to [email protected] with the message: INFO IBM-MAIN
>

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to