Previous topic |
Next topic |
Contents |
Contact z/OS |
Library |
PDF
Content and structure of the UADS z/OS TSO/E Customization SA32-0976-00 |
|
The UADS (SYS1.UADS) is basically a list of terminal users who
are authorized to use TSO/E. The UADS contains information about each
of the users, and is used to regulate access to the system. An entry
exists in the UADS for each authorized user of TSO/E. Each entry contains:
The organization of the information contained in the UADS is shown in Figure 1. Figure 2 shows the simplest structure that an entry in the UADS can have, and Figure 3 shows a more complex structure. Figure 1. Organization
of the UADS
Figure 2. The simplest
structure for a typical UADS entry
Figure 3. A complex structure
for a typical UADS entry
|
Copyright IBM Corporation 1990, 2014
|