Itschak, Your post piqued my interest, but it’s around 35 years since I was actually involved in RACF, ACF2, TSS and some other non-starters.
I can’t really help further. Sorry! On Wed, Mar 3, 2021 at 15:23 Itschak Mugzach < [email protected]> wrote: > John, > > I read the doc. It describes ACF2 coverage for UADS functionality. But what > happens if ACF2 refuses to start? In RACF, the UADS dataset is saved in > RCVTUADS. I looked at ACCVT mapping macro and there is no such field. > > ITschak > > *| **Itschak Mugzach | Director | SecuriTeam Software **|** IronSphere > Platform* *|* *Information Security Continuous Monitoring for Z/OS, zLinux > and IBM I **| * > > *|* *Email**: [email protected] **|* *Mob**: +972 522 986404 **|* > *Skype**: ItschakMugzach **|* *Web**: www.Securiteam.co.il **|* > > > > > > On Wed, Mar 3, 2021 at 8:47 PM John Lock <[email protected]> wrote: > > > Some ancient info here ....... > > > > > http://vtda.org/docs/computing/IBM/Mainframe/MainframeSecurity/198501_Access%20Control%20Facility%20General%20Information%20Manual.pdf > > > > > > On Wed, Mar 3, 2021 at 13:40 Itschak Mugzach < > > [email protected]> wrote: > > > > > UADS is in a bypass state. However, I still wonder what happens if ACF2 > > > fails to start and we need to authenticate with UADS. Where is the UADS > > > dataset name saved? I don't think we can access the MSTRJCL data area > (I > > > don;r think it is documented anywhere). > > > > > > *| **Itschak Mugzach | Director | SecuriTeam Software **|** IronSphere > > > Platform* *|* *Information Security Continuous Monitoring for Z/OS, > > zLinux > > > and IBM I **| * > > > > > > *|* *Email**: [email protected] **|* *Mob**: +972 522 986404 > > **|* > > > *Skype**: ItschakMugzach **|* *Web**: www.Securiteam.co.il **|* > > > > > > > > > > > > > > > > > > On Wed, Mar 3, 2021 at 8:19 PM Jeremy Nicoll < > > > [email protected]> > > > wrote: > > > > > > > On Wed, 3 Mar 2021, at 17:11, ITschak Mugzach wrote: > > > > > I looked at RCVT in an ACF2 system, but the RCVTUADS is nullified. > > How > > > > can > > > > > I locate the active UADS in this case? > > > > > > > > What would a UADS be used for on such a system? > > > > > > > > Wouldn't everything user-related be under ACF2 control? > > > > > > > > -- > > > > Jeremy Nicoll - my opinions are my own. > > > > > > > > > ---------------------------------------------------------------------- > > > > For IBM-MAIN subscribe / signoff / archive access instructions, > > > > send email to [email protected] with the message: INFO > IBM-MAIN > > > > > > > > > > ---------------------------------------------------------------------- > > > For IBM-MAIN subscribe / signoff / archive access instructions, > > > send email to [email protected] with the message: INFO IBM-MAIN > > > > > > > ---------------------------------------------------------------------- > > For IBM-MAIN subscribe / signoff / archive access instructions, > > send email to [email protected] with the message: INFO IBM-MAIN > > > > ---------------------------------------------------------------------- > For IBM-MAIN subscribe / signoff / archive access instructions, > send email to [email protected] with the message: INFO IBM-MAIN > ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [email protected] with the message: INFO IBM-MAIN
