z/OS TSO/E Customization
Previous topic | Next topic | Contents | Contact z/OS | Library | PDF


Content and structure of the UADS

z/OS TSO/E Customization
SA32-0976-00

The UADS (SYS1.UADS) is basically a list of terminal users who are authorized to use TSO/E. The UADS contains information about each of the users, and is used to regulate access to the system. An entry exists in the UADS for each authorized user of TSO/E. Each entry contains:
  • A user identification
  • One or more passwords, or a single null field, associated with the user identification
  • One or more account numbers, or a single null field, associated with each password
  • One or more procedure names associated with each account number. Each name identifies a procedure that may be invoked when the user enters the LOGON command.
  • Additional attribute information as described in under the ACCOUNT command. The ACCOUNT command and its subcommands allow you to create and update the entries in the UADS.

The organization of the information contained in the UADS is shown in Figure 1. Figure 2 shows the simplest structure that an entry in the UADS can have, and Figure 3 shows a more complex structure.

Figure 1. Organization of the UADS

Organization of the UADS

Figure 2. The simplest structure for a typical UADS entrySimplest structure for a typical UADS entry
Figure 3. A complex structure for a typical UADS entryComplex structure for a typical UADS entry

Go to the previous page Go to the next page




Copyright IBM Corporation 1990, 2014