search cancel

Query on PTF LU07787 Hiper Notification

book

Article ID: 253404

calendar_today

Updated On:

Products

ACF2 Trusted Access Manager for Mainframe ACF2 - z/OS ACF2 - MISC ACF2 - DB2 Option

Issue/Introduction

Hiper for PTF LU07787 has the title of "POSSIBLE STORAGE OVERLAY TAMZ USER UPDATING MAX RECORD".  While we do NOT use TAMZ, the description also has:

The overlay/abend is possible when an elevated user is either updating a LOGONID or INFO-STG record.

What exactly is an "elevated user" in the context of this particular hiper? Is this referring to elevation via TAMZ or normally elevated user?

We do have both scoped and unscoped SECURITY users, and need to know if we are exposed to this issue.

Environment

Release : 16.0

Resolution

TAMz (Trusted Access Manager for Z) is a separate Broadcom Product that ACF2, Top Secret and RACF can utilize. As you have explained you do not have TAMz (Trusted Access Manager for Z) running, this PTF will not affect your system.

 

Regarding Hiper LU07787 has the title of "POSSIBLE STORAGE OVERLAY TAMZ USER UPDATING MAX RECORD".  While we do NOT use TAMZ, the description also has:

The overlay/abend is possible when an elevated user is either updating a LOGONID or INFO-STG record.

What exactly is an "elevated user" in the context of this particular hiper? Is this referring to elevation via TAMZ or normally elevated user?

It is referring to elevation via TAMZ. Allowing users to issue the ELEVATE subcommand to gain elevated access permissions for themselves or for other users. This task is done using the TAM.ELEVATE.class.user rule lines in the Trusted Access Manager for Z rule. The amount of time for the elevated user to possess the elevated permissions is specified in the CONTROL(TAM) CLASS record TIMEBOX field. Allowing qualified personnel quick access to elevated permissions lets them work with resources in emergencies or solve critical problems immediately.

We do have both scoped and unscoped SECURITY users, and need to know if we are exposed to this issue.

Will not be exposed to this issue without having TAMz (Trusted Access Manager for Z) running on the system.