I will be out of the office starting 09/27/2008 and will not return until
10/06/2008.
I am out of the office until Oct 6. I will have no email access and no
telephone or voice maile access during this time.
__
This email may contain
At my -former- customer's installation, we set the inactivity value to
something around 6 months. This suited us as it was decided to IPL
the z/VM systems at winter/summer time zone change.
If that doesn't suit you:
To take care of MAINT friends, you might use a server like VMUTIL to
have those
Hi Raymond,
For dedicated DASD, CP doesn't look at the SHARED setting (or really
anything else); the CCW goes straight to the hardware.
For Minidisks,
- If the v suffix is not defined on the MDISK statement in the user
directory, a command reject is simulated; I assumed this was the case
Kris Buelens wrote:
If that doesn't suit you:
To take care of MAINT friends, you might use a server like VMUTIL to
have those XAUTOLOGged every month or so.
Now I get what ppl were saying before about XAUTOLOGing things
regularly. Didn't sink in before...
For other servers that cannot be
DIRM SETPW: that would need the the Dirmaint-RACF interfaces active.
If you'd go that way, better use RAC ALTUSER userid PASSWORD(xyz)
2008/9/27 Leland Lucius [EMAIL PROTECTED]
Kris Buelens wrote:
If that doesn't suit you:
To take care of MAINT friends, you might use a server like VMUTIL to
On Saturday, 09/27/2008 at 12:26 EDT, Leland Lucius [EMAIL PROTECTED]
wrote:
Just wondering what folks set INACTIVE() to a Linux only environment
where guests stay up for long periods or where MAINT and the like aren't
used for long periods.
When we installed RACFVM, our security team set
Could we still get onto that userid via LOGONBY?
/Tom Kern
Alan Altmark wrote:
A possible compromise could be:
ALTUSER userid NOPHRASE NOPASSWORD
will completely remove the password and phrase.
- No one can logon directly to or use the id for authentication
- The user can still be
Yes...
Sent from my iPhone
On Sep 27, 2008, at 5:48 PM, Thomas Kern [EMAIL PROTECTED] wrote:
Could we still get onto that userid via LOGONBY?
/Tom Kern
Alan Altmark wrote:
A possible compromise could be:
ALTUSER userid NOPHRASE NOPASSWORD
will completely remove the password and phrase.
-
Alan Altmark wrote:
A possible compromise could be:
ALTUSER userid NOPHRASE NOPASSWORD
will completely remove the password and phrase.
- No one can logon directly to or use the id for authentication
- The user can still be XAUTOLOGed
- The user will never be revoked due to inactivity or too
Scott Rohling wrote:
Yes...
Sent from my iPhone
On Sep 27, 2008, at 5:48 PM, Thomas Kern [EMAIL PROTECTED] wrote:
Could we still get onto that userid via LOGONBY?
Awesome, then that sounds like the way to go.
Thanks everyone!
Leland
On Sunday, 09/28/2008 at 12:50 EDT, Leland Lucius [EMAIL PROTECTED]
wrote:
This would certainly make it easy and we wouldn't have to have any
non-standard scheduled touching of the ID. I'll have to ponder it a
little though since we do log onto a guest every so often to get to its
console.
On Friday, 09/26/2008 at 10:02 EDT, Mark T. Regan, K8MTR
[EMAIL PROTECTED] wrote:
Since we have VM/RSCS appearing as a RJP workstation to JES3 using EP
and a
3745, can it do the same using the SNA protocol to look like a 3770
device, but
minus the 3745?
Your best bet is to try it. Create
12 matches
Mail list logo