z/OS Security Server RACF Security Administrator's Guide
Previous topic | Next topic | Contents | Contact z/OS | Library | PDF


QMF form

z/OS Security Server RACF Security Administrator's Guide
SA23-2289-00

If the SQL query shown in Figure 1 is processed using QMF™, the data that is returned can be processed into a report. Figure 1 shows a report or forms definition. It creates the report shown in Figure 1 entitled "Data Set Profiles With Access Lists Containing User IDs or Group Names That Are Not Valid".
Figure 1. A sample QMF form
 COLUMNS:                Total Width of Report Columns: 80              
                                                                        
 NUM COLUMN HEADING                         USAGE  INDENT WIDTH EDIT SEQ
 --- -------------------------------------- ------ ------ ----- ---- ---
  1 DSACC_NAME                              BREAK1 2      44    C    1
  2 DSACC_AUTH_ID                                  2      8     C    2
  3 DSACC_ACCESS                                   2      9     C    3
  4 DSACC_ACCESS_CNT                               2      11    L    4


 PAGE:    HEADING  ===> DATA SET PROFILES WITH ACCESS LISTS CONTAINING
                        USER IDS OR GROUP NAMES THAT ARE NOT VALID
	        FOOTING  ===>
 FINAL:   TEXT     ===>
 BREAK1:  NEW PAGE FOR BREAK? ===> NO
          FOOTING  ===>
 BREAK2:  NEW PAGE FOR BREAK? ===> NO
          FOOTING  ===>
 OPTIONS: OUTLINE? ===> YES          DEFAULT BREAK TEXT? ===> NO

Go to the previous page Go to the next page




Copyright IBM Corporation 1990, 2014