Rob van der Heij wrote:
>Actually, the better solution is to have *no* password for TCPMAINT.
>You can with z/VM 5.3. Without a password, the TCPMAINT user can not
>be revoked by incorrect logon attempts. If it were revoked, the
>authorized people could not even logon to it with logonby. Also, you
>don't put individual users on the access list of the surrogate
>profile, but primarily groups of users. That way it is very easy to
>handle people joining or leaving the group or change their role. And
>if needed, you can use Q BYUSER in the PROFILE EXEC to see which
>person is using the shared userid.

Be careful about what "*no* password" means.  Rob is talking about RACF.
The directory allows a password of NOPASS, which might seem to be the
obvious thing if you don't read the manual.  NOPASS actually allows
anyone to log on without specifying a password.  If using VM:Secure or
no ESM, specify a password of LBYONLY.

                                                       Dennis 

We are Borg of America.  You will be assimilated.  Resistance is futile.

Reply via email to