Does anyone know how ACF2 validates a users access to specific applications?

Recently we tried to migrate from ACF2 to RACF and were forced to fallback 
because ACF2 was somehow *wildcarding* a user's access to applications whereas 
RACF was iterating through a list of applications.

The resulting overhead across 1000's of users exhausted memory leaving no room 
for LSQA and producing 878 abends.



----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN

Reply via email to