Previous topic |
Next topic |
Contact z/OS |
z/OS Security Server RACF Security Administrator's Guide
If the SQL query shown in Figure 1 is processed using QMF™, the data that is returned can be processed into a report. Figure 1 shows a report or forms definition. It creates the report shown in Figure 1 entitled "Data Set Profiles With Access Lists Containing User IDs or Group Names That Are Not Valid".
Figure 1. A sample QMF form
Copyright IBM Corporation 1990, 2014