On 11/22/2005 10:57 AM, Patrick Lyon wrote:
On Tue, 22 Nov 2005 08:33:25 -0600, Dave Butts <[EMAIL PROTECTED]>
wrote:
Patrick,
I can't speak for ACF2 or RACF, but the conversion to Top Secret is
incredibly simple. One of the TSS manuals has a chapter on how to do it.
It is as simple as running a batch job to perform the conversion.
HTH, Dave
Dave, we have RACF. Perhaps there is something available within RACF that
will do the same. I will do some checking.
Thanks for the tip!
The conversion utility is part of TSO/E, and is called RACONVRT. Look
in the TSO/E Customization manual for information.
As I recall it does not copy the user's logon command (from the logon
panel) during the conversion process, but I believe that if you leave
the user entries in UADS until after their first logon, that TSO/E will
grab the command from UADS at that time, and put it into RACF.
Walt Farrell, CISSP
z/OS Security Design, IBM
----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html