In <04b3da7b71b3ab408ca62ba6046bcf8f23d673a...@gvw0676exc.americas.hpqcorp.net>, on 01/05/2012 at 11:49 PM, "Henke, George" <george.he...@hp.com> said:
>Does anyone know how ACF2 validates a users access to specific >applications? Not without knowing how the installation has defined each. >Recently we tried to migrate from ACF2 to RACF and were forced to >fallback because ACF2 was somehow *wildcarding* a user's access to >applications whereas RACF was iterating through a list of >applications. What are you trying to say? -- Shmuel (Seymour J.) Metz, SysProg and JOAT ISO position; see <http://patriot.net/~shmuel/resume/brief.html> We don't care. We don't have to care, we're Congress. (S877: The Shut up and Eat Your spam act of 2003) ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN