Another way is to issue a RACROUTE REQUEST=EXTRACT and specify the UACC
and/or USERACS fields on the extract FIELDS parameter list.

Refer to the RACROUTE Macro Reference appendix-B.

That's what we did on last year when we developed the SAF Interface for
CA Tape Encryption.  (Of course, if I'm wrong I'll let Russ bail me
out). 

Regards,

Gary 
 
> David Eisenberg wrote:
> > Anyone,
> >
> > I'm just getting familiar with the RACROUTE macro. I have a 
> working example 
> > of the macro with REQUEST=AUTH that generates a violation when 
> > appropriate.
> >
> > My question is: is there a way to interrogate RACF 
> (presumably via the 
> > RACROUTE macro) to simply *ask* whether or not a particular 
> user has read 
> > or write access to a dataset, but without actually issuing 
> a violation if the 
> > user is unauthorized? All I want to do is get a yea or nay 
> answer (via R15, I 
> > assume), then proceed accordingly and programmatically.
> >
> > I hope this makes sense... thank you!
> >
> > David
> >
> >
> >   
> 
> LOG=NOFAIL on the macro call?
> 
> -- 
> Mark Jacobs

I think that LOG=NONE might be better. That way, successful access is
not logged either (in the case where the resource or user is AUDIT'ed).
I'd also use USER= to specify the userid for 3rd party access.

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to