Previous Topic: TSO User Attributes Data Set

Next Topic: User Attributes Data Set

Access Control Software Protection

If a data center uses an access control software package, the method of protection changes somewhat. For example, CA ACF2 takes over TSO password management and can also take over the other functions that UADS normally performs. However, this option is not the default. The NOUADS parameter must be specified in the GSO OPTS record of CA ACF2. RACF and CA Top Secret require the use of UADS, although both use their own password management techniques. All three of these systems encrypt and store the logon passwords in their own databases. These systems ignore the passwords in UADS. Even systems that normally do not use UADS, however, usually keep a UADS data set in case the system is used in an emergency without starting the security system.