Does anyone know how ACF2 validates a users access to specific applications?
Recently we tried to migrate from ACF2 to RACF and were forced to fallback because ACF2 was somehow *wildcarding* a user's access to applications whereas RACF was iterating through a list of applications. The resulting overhead across 1000's of users exhausted memory leaving no room for LSQA and producing 878 abends. ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN