In
<04b3da7b71b3ab408ca62ba6046bcf8f23d673a...@gvw0676exc.americas.hpqcorp.net>,
on 01/05/2012
   at 11:49 PM, "Henke, George" <george.he...@hp.com> said:

>Does anyone know how ACF2 validates a users access to specific
>applications?

Not without knowing how the installation has defined each.

>Recently we tried to migrate from ACF2 to RACF and were forced to
>fallback because ACF2 was somehow *wildcarding* a user's access to
>applications whereas RACF was iterating through a list of
>applications.

What are you trying to say?
 
-- 
     Shmuel (Seymour J.) Metz, SysProg and JOAT
     ISO position; see <http://patriot.net/~shmuel/resume/brief.html> 
We don't care. We don't have to care, we're Congress.
(S877: The Shut up and Eat Your spam act of 2003)

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN

Reply via email to