On 11/22/2005 10:57 AM, Patrick Lyon wrote:
On Tue, 22 Nov 2005 08:33:25 -0600, Dave Butts <[EMAIL PROTECTED]>
wrote:

Patrick,
I can't speak for ACF2 or RACF, but the conversion to Top Secret is
incredibly simple.  One of the TSS manuals has a chapter on how to do it.
It is as simple as running a batch job to perform the conversion.

HTH, Dave

Dave, we have RACF.  Perhaps there is something available within RACF that
will do the same.  I will do some checking.

Thanks for the tip!

The conversion utility is part of TSO/E, and is called RACONVRT. Look in the TSO/E Customization manual for information.

As I recall it does not copy the user's logon command (from the logon panel) during the conversion process, but I believe that if you leave the user entries in UADS until after their first logon, that TSO/E will grab the command from UADS at that time, and put it into RACF.

        Walt Farrell, CISSP
        z/OS Security Design, IBM

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to