Another way is to issue a RACROUTE REQUEST=EXTRACT and specify the UACC and/or USERACS fields on the extract FIELDS parameter list.
Refer to the RACROUTE Macro Reference appendix-B. That's what we did on last year when we developed the SAF Interface for CA Tape Encryption. (Of course, if I'm wrong I'll let Russ bail me out). Regards, Gary > David Eisenberg wrote: > > Anyone, > > > > I'm just getting familiar with the RACROUTE macro. I have a > working example > > of the macro with REQUEST=AUTH that generates a violation when > > appropriate. > > > > My question is: is there a way to interrogate RACF > (presumably via the > > RACROUTE macro) to simply *ask* whether or not a particular > user has read > > or write access to a dataset, but without actually issuing > a violation if the > > user is unauthorized? All I want to do is get a yea or nay > answer (via R15, I > > assume), then proceed accordingly and programmatically. > > > > I hope this makes sense... thank you! > > > > David > > > > > > > > LOG=NOFAIL on the macro call? > > -- > Mark Jacobs I think that LOG=NONE might be better. That way, successful access is not logged either (in the case where the resource or user is AUDIT'ed). I'd also use USER= to specify the userid for 3rd party access. ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html