11.07.2015 Views

eTrust™CA-ACF2® Security for z/OS and OS/390 ... - SupportConnect

eTrust™CA-ACF2® Security for z/OS and OS/390 ... - SupportConnect

eTrust™CA-ACF2® Security for z/OS and OS/390 ... - SupportConnect

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Computer Associates International, Inc.2400 Cabot DriveLisle, IL 60532-36521-630-505-6000FAX: 1-630-505-6097To:From:eTrust CA-ACF2® <strong>Security</strong> <strong>for</strong> z/<strong>OS</strong> <strong>and</strong> <strong>OS</strong>/<strong>390</strong> ClientsThe Computer Associates eTrust CA-ACF2 Product GroupDate: February 11, 2003Subject: Release 6.5 of eTrust CA-ACF2 <strong>Security</strong> <strong>for</strong> z/<strong>OS</strong> <strong>and</strong> <strong>OS</strong>/<strong>390</strong> General Availability (GA)Product In<strong>for</strong>mation Bulletin PIB# QI33613Dear Valued Client:Computer Associates International Inc. is pleased to present you with the General Availability (GA)product package <strong>for</strong> Release 6.5 of eTrust CA-ACF2 <strong>Security</strong> (eTrust CA-ACF2) <strong>for</strong> z/<strong>OS</strong> <strong>and</strong> <strong>OS</strong>/<strong>390</strong>,an integral component of the family of solutions we provide <strong>for</strong> the z/<strong>OS</strong> <strong>and</strong> <strong>OS</strong>/<strong>390</strong> operating systems.We are dedicated to ensuring that your use of eTrust CA-ACF2 is successful <strong>and</strong> we want to thank you<strong>for</strong> your continued support of Computer Associates. If you have any questions regarding this softwaresolution, contact your local eTrust CA-ACF2 Technical Support group. Also, visit our support web site athttp://support.ca.com.Software PrerequisitesYour IBM software must meet these minimum requirements to operate thisrelease of eTrust CA-ACF2:• <strong>OS</strong>/<strong>390</strong> Version 2 Release 9 <strong>and</strong> above (including z/<strong>OS</strong> Version 1Release 4)• JES2 <strong>OS</strong>/<strong>390</strong> Version 2 Release 8• JES3 <strong>OS</strong>/<strong>390</strong> Version 2 Release 9• DFSMS 1.2.0 <strong>and</strong> above• ACF/VTAM 3.4.2 <strong>and</strong> above• PSF MVS 2.1.0 <strong>and</strong> above (required <strong>for</strong> eTrust CA-ACF2 M<strong>and</strong>atoryAccess Control [MAC]If you are running any of the following software, it must meet these requirementsto run concurrently with this release of eTrust CA-ACF2:• CICS/ESA Release 4.1 <strong>and</strong> aboveFebruary 2003eTrust CA-ACF2 <strong>Security</strong> <strong>for</strong> z/<strong>OS</strong> <strong>and</strong> <strong>OS</strong>/<strong>390</strong>


Summary of ChangesThe following section itemizes changes included in eTrust CA-ACF2 Release6.5. We recommend that you take time to read more about these changes in theRelease 6.5 eTrust CA-ACF2 <strong>Security</strong> <strong>for</strong> z/<strong>OS</strong> <strong>and</strong> <strong>OS</strong>/<strong>390</strong> Release Guide <strong>and</strong>the Release 6.5 eTrust CA-ACF2 <strong>Security</strong> <strong>for</strong> z/<strong>OS</strong> <strong>and</strong> <strong>OS</strong>/<strong>390</strong> Getting Startedguide be<strong>for</strong>e proceeding with the installation.• LINUX PAM Support. PAM (Pluggable Authentication Modules) is aflexible, open-source architecture <strong>for</strong> user authentication <strong>and</strong> resourcechecking on Linux systems. PAM support allows eTrust CA-ACF2 toact as an authentication server <strong>for</strong> one or more Linux systems,eliminating the need <strong>for</strong> redundant security administration on a systemby-systembasis. PAM system features include: password verification,password changes, access authorization, session management <strong>and</strong> casesensitive<strong>and</strong> long user names. The eTrust PAM Server runs as a daemonon z/<strong>OS</strong> <strong>and</strong> <strong>OS</strong>/<strong>390</strong>.Note: At the General Availability release of 6.5, the eTrust PAM Server<strong>for</strong> z/<strong>OS</strong> <strong>and</strong> <strong>OS</strong>/<strong>390</strong> code is still in beta status. Contact your localComputer Associates Technical Support group <strong>for</strong> further in<strong>for</strong>mation.• eTrust LDAP Directory Services (LDS). Release 6.5 enhances LDAPsupport by providing <strong>for</strong> automatic propagation of Logonid changes toLDAP directory servers. Similar in function to Comm<strong>and</strong> PropagationFacility (CPF), the transmission of changes to the connected LDAPnodes occurs after local Logonid update processing is per<strong>for</strong>med. Newcontrol records are provided to define the connected LDAP directoryservers, the types of eligible Logonid updates (e.g. insert/change/delete),<strong>and</strong> the mapping of local Logonid fields to remote LDAP fields. Inaddition, a new Logonid control allows you to customize the specificLogonid records eligible <strong>for</strong> LDS processing. The connected LDAPdirectory servers can be connected to an eTrust Admin user directorygiving you the capability to automatically update <strong>and</strong> synchronize userdefinitions on all eTrust controlled systems in your enterprise fromeTrust CA-ACF2.Note: The Release 6.5 SP00 eTrust CA-ACF2 <strong>Security</strong> <strong>for</strong> z/<strong>OS</strong> <strong>and</strong><strong>OS</strong>/<strong>390</strong> Getting Started guide incorrectly states that LDS supports LDAPservers that employ Secure Sockets Layer (SSL) technology. Thisreference will be removed from the eTrust CA-ACF2 <strong>Security</strong> <strong>for</strong> z/<strong>OS</strong><strong>and</strong> <strong>OS</strong>/<strong>390</strong> Getting Started guide at the SP01 Service pack level.February 2003eTrust CA-ACF2 <strong>Security</strong> <strong>for</strong> z/<strong>OS</strong> <strong>and</strong> <strong>OS</strong>/<strong>390</strong>


• $NORULELNG on Rules. A new rule control statement called$NORULELNG has been added. Like the NORULELONG COMPILEstatement option, it enhances rule compilation processing by allowing theuser to generate 4K rules even on a system where RULELONG supportis active. This is useful <strong>for</strong> installations that have a business need toimplement 32K rules <strong>for</strong> only a subset of their rules.• HFS <strong>Security</strong> Enhancements. A new operational control <strong>for</strong> CA SAFHFS (Hierarchical File System) initialization, HFSSEC, has been addedto the GSO UNIXOPTS record. In addition, new eTrust CA-ACF2operator comm<strong>and</strong>s allow you to alter or inquire about the status of CASAF HFS security, providing even greater flexibility, security, <strong>and</strong>auditability.• SHOW ACTIVE. Release 6.5 changes the display of any exit with noassociated exit module to display ‘*NONE*’ instead of ‘NONE’. Theasterisks denote that no module has been defined.• SHOW REALM. GSO REALM records were introduced in Release 6.4.Release 6.5 includes a new SHOW comm<strong>and</strong> to display the GSOREALM records. All fields in each REALM record are <strong>for</strong>matted except<strong>for</strong> any password or encrypted fields.• SAF Callable Service. Release 6.5 provides support <strong>for</strong> SAF CallableService R_cacheserv cache hardening, restoring <strong>and</strong> deleting. Thefunctions to be supported are: Harden, Restore, Version Fetch <strong>and</strong>Delete.• Show Sysplex Enhancement. The show sysplex comm<strong>and</strong> has beenenhanced to include the XCF member name.• Logonid Expiration Warning. eTrust CA-ACF2 Release 6.5 supports aLogonid expiration warning message. A field, WRNDAYS, has beenadded to the GSO OPTS record. The new WRNDAYS GSO OPTS fieldcontrols the time period between the actual expiration of the Logonid <strong>and</strong>the display of the warning messages. When a Logonid is accessed <strong>and</strong>the expiration date is within the WRNDAYS time period, the user willreceive a warning message each time they access the system with thatLogonid.• Report Enhancements.NV Report - The Environment Report (ACFRPTNV) now includes theLogonid of the user issuing ACF operator console comm<strong>and</strong>s.SL Report - The date field arithmetic now spans year boundaries.February 2003eTrust CA-ACF2 <strong>Security</strong> <strong>for</strong> z/<strong>OS</strong> <strong>and</strong> <strong>OS</strong>/<strong>390</strong>


RV Report – A summary index of access activity is provided in theACFRPTRV Resource Violation log report similar to the one provided inthe ACFRPTDS dataset report.RL <strong>and</strong> EL Report – A new parameter called CHANGES has beenadded that, when specified, reports on the entries deleted from or insertedinto a rule set.• NEXTKEY on Rule Decompiles. The DECOMPILE comm<strong>and</strong> <strong>for</strong>data set <strong>and</strong> resource rules has been enhanced. When the new ALLkeyword is specified, both the target rule set <strong>and</strong> all associatedNEXTKEY rule sets found are decompiled.• Digital Certificate Administration. Release 6.5 provides the ability togenerate digital certificates <strong>and</strong> digital certificate requests. The ability toexport certificates with their private keys is also added. Otherenhancements include improving the display of certification in<strong>for</strong>mation.• PDS Member-Level Protection Changes. Users of the PDS Member-Level Protection component prior to release 6.4 SP02 should note that achange has been made to the "bypass" check. A dataset validation ismade against a pseudo-dataset name called CAPDSSEC.BYPASS.classto determine whether member-level security is en<strong>for</strong>ced <strong>for</strong> a user. Thecheck was <strong>for</strong>merly made <strong>for</strong> READ access to the pseudo-dsn, but it hasbeen changed to check <strong>for</strong> WRITE access. This was done toaccommodate users of the READALL privilege that also wantedmember-level security to be in effect. All users of member-level securitymust change their dataset rule <strong>for</strong> high-level qualifier CAPDSSEC fromREAD(ALLOW) to WRITE(ALLOW).• Profile Rule Record API. A new API called ACFCMPL3 has beenadded <strong>for</strong> compiled profile records. This API is similar to theACFCMPLR interface provided <strong>for</strong> Access <strong>and</strong> Generalized ResourceRule maintenance.• CPF Enhancement. The Comm<strong>and</strong> Propagation Facility (CPF) hasbeen enhanced to provide propagation of logonid status changes (i.e.SUSPEND) made via the ACTRM SVC-A call. AllF ACF2,RESET(logonid) operator modify comm<strong>and</strong>s will be propagatedas well.• New Password Controls. Six new password controls have been addedto provide the security administrator with greater control over the contentof passwords. The security administrator may, <strong>for</strong> example, <strong>for</strong>bid usersfrom entering passwords with recurring character sequences, may requirethat one or more vowels or numeric characters be specified, or mayrequire additional special characters to be used. Combined, thesecontrols can significantly strengthen your installation’s passwordcontrols.February 2003eTrust CA-ACF2 <strong>Security</strong> <strong>for</strong> z/<strong>OS</strong> <strong>and</strong> <strong>OS</strong>/<strong>390</strong>


• ACF NEWMOD Enhancements. In eTrust CA-ACF2 Release 6.5, theF ACF2,NEWMOD(SAF) can dynamically reload all of the reloadableSAF modules without an IPL.• ACCESS Subcomm<strong>and</strong>. The ACCESS subcomm<strong>and</strong> has beenenhanced to streamline per<strong>for</strong>mance <strong>and</strong> provide additional in<strong>for</strong>mation.An in-storage Logonid/UID cross-reference table eliminates Logoniddatabase I/O <strong>and</strong> the Logonid scoping restriction placed on comm<strong>and</strong>issuers. The new display <strong>for</strong>mat lists keys, Nextkeys, prefixes, matchingrulelines <strong>and</strong> associated Logonids.• ACL Support. z/<strong>OS</strong> 1.3 introduces support <strong>for</strong> Access Control Lists(ACL) <strong>for</strong> the HFS file system. ACL’s provide more granular control ofaccess to the HFS files <strong>and</strong> directories when using native HFS security.eTrust CA-ACF2 supports the new R_setfacl callable service request tocreate, modify, <strong>and</strong> delete ACL’s, <strong>and</strong> checks ACL’s when access to afile or directory is requested.• Message <strong>and</strong> Panel Changes. Release 6.5 provides support <strong>for</strong> thecorporate-wide rebr<strong>and</strong>ing ef<strong>for</strong>t of the product name fromCA-ACF2 <strong>for</strong> <strong>OS</strong>/<strong>390</strong> to eTrust CA-ACF2 <strong>Security</strong> <strong>for</strong> z/<strong>OS</strong> <strong>and</strong><strong>OS</strong>/<strong>390</strong>. This rebr<strong>and</strong>ing changed many administrative <strong>and</strong> reportpanels, help panels, clists, report headings, messages, <strong>and</strong> alldocumentation.• Started Task (STC) GSO Record. The new STC GSO record can beused to assign a Logonid <strong>and</strong> optional Groupid based on the started taskID. Use of masking allows a single STC record to pertain to multiplestarted tasks.Prior to Release 6.5, a started task (STC) was assigned a Logonid basedon the following:o The user could explicitly request a Logonid via the USER= JCLparameter, or eTrust CA-ACF2 would use a Logonid equal to theSTC procedure nameo The appropriate default STC Logonid would be used.With Release 6.5 <strong>and</strong> the new GSO STC record, this processing isslightly altered.An internal table called the STC table is built during eTrustCA-ACF2 initialization or during REFRESH processing from theappropriate GSO STC records that are defined. This table is then used aspart of the process of determining what Logonid to assign to a particularSTC. This process can be summarized as follows:o The user could explicitly request a Logonid via the USER= JCLparameter, or eTrust CA-ACF2 would use a Logonid equal to theSTC procedure name.February 2003eTrust CA-ACF2 <strong>Security</strong> <strong>for</strong> z/<strong>OS</strong> <strong>and</strong> <strong>OS</strong>/<strong>390</strong>


o The STC table is searched <strong>for</strong> an entry matching the STCprocedure name. If found, the Logonid <strong>and</strong> optionally the groupis used from the appropriate STC table entry.o The appropriate default STC Logonid would be used.• High-Level Interface Enhancements. A new C language interface hasbeen added to HLI, which currently supports Assembler, Cobol, Fortran,<strong>and</strong> PL/I. This new feature permits you to implement the HLIsubfunctions using C applications.• Rule Cleanup Utility Enhancements. The ACFRULCU utilityidentifies rule lines that are no longer needed. These can be <strong>for</strong> Logonidsthat no longer exist or UIDs that are no longer valid. The ACFRULCUutility can be used <strong>for</strong> access rules, resource rules, <strong>and</strong> DB2 rules.Release 6.5 includes an enhancement to the ACFRULCU utility thatallows you to specify more than one TYPE to run the ACFRULCUagainst. You can also exclude certain TYPE values from being processedby the ACFRULCU through the new EXCLTYPE parameter.• Dynamic Compile Option. A new GSO RULEOPTS option,COMPDYN, simplifies rule administration when RULELONG is active.Rule compiles will be per<strong>for</strong>med initially using the 4K rule compiler <strong>and</strong>then, if the rule is greater than 4K, will be retried using the RULELONGcompiler.• CSI Zone Compare Utility. The CSI Zone Compare utility(SAFTAXRF) generates a report to indicate any sysmods present in aneTrust CA-ACF2 Release 6.4 target zone that are not present in thenewly installed Release 6.5 zone. This utility is optional. The targetzones specified must be an eTrust CA-ACF2 Release 6.4 target zone(OLD TZONE) <strong>and</strong> an eTrust CA-ACF2 Release 6.5 target zone (NEWTZONE). Specifying other target zones may produce incorrect results.The JCL <strong>and</strong> PROC required to run this report can be found in membersSAFTAXJC <strong>and</strong> SAFTAXRF in the CAI.ACF2.SAMPJCL library.Review these members <strong>and</strong> make any necessary changes prior toexecution. For additional in<strong>for</strong>mation on this utility, see the Release 6.5eTrust CA-ACF2 <strong>Security</strong> <strong>for</strong> z/<strong>OS</strong> <strong>and</strong> <strong>OS</strong>/<strong>390</strong> Report <strong>and</strong> UtilitiesGuide.• eTrust CA-ACF2 <strong>Security</strong> Enhancements <strong>for</strong> CICS.CICS Installation Enhancements – eTrust CA-ACF2 <strong>Security</strong> <strong>for</strong>CICS installation is simplified. The level-set PTF has been eliminated,which streamlines product packaging <strong>and</strong> client installation procedures<strong>and</strong> also helps to eliminate some of the more common installation errors.New API Inquire call - A new ACFAEUCP API inquire call has beenadded. It allows the status of CICSKEY <strong>and</strong> USERKEY resources to bequeried, providing a subset of the in<strong>for</strong>mation that the ACFM OD(option display) CICSKEY/USERKEY functions currently provide.February 2003eTrust CA-ACF2 <strong>Security</strong> <strong>for</strong> z/<strong>OS</strong> <strong>and</strong> <strong>OS</strong>/<strong>390</strong>


CICS Startup Messages - To provide <strong>for</strong> greater auditability,in<strong>for</strong>mational WTO messages are issued <strong>for</strong> all CICS DFHSIT (SystemInitialization Table) values that are overridden by eTrust CA-ACF2CICS security controls.CICS Timeout Processing - All specific terminal sign-on instances thatare signed off by terminal timeout support are now recorded to theACF2LOG report.CICS Multi-Sign-ons - A new initialization control, SIGNONMULTSIGN, designates a Logonid privilege that, when specified, allowsselected users to establish multiple sign-on instances when sign-onenqueue controls (SIGNON ENQSCOPE) are active. This will be of useto technical personnel who have a legitimate business need to establishmultiple CICS sign-on sessions to concurrently use system products <strong>and</strong>functions such as CEMT, ACFM, Unicenter ® CA-SYSVIEW ® RealtimePer<strong>for</strong>mance Management, <strong>and</strong> other functions.CICS Sign-on Failure Messages - The terminal ID is included in theACFAE145 message issued <strong>for</strong> sign-on failures. This message is issuedwhen sign-on enqueue controls are active <strong>and</strong> a user has alreadyestablished a sign-on session on a particular CICS region. The additionalin<strong>for</strong>mation will be helpful <strong>for</strong> the user <strong>and</strong>/or the help desk.Dem<strong>and</strong> Analysis Requests. At Computer Associates, customer feedback <strong>and</strong>suggestions <strong>for</strong> product enhancements are very important to us. We value yourinput, not only as our customer, but more importantly, as our partner. Continuingwith our policy of constant product upgrades <strong>and</strong> improvements, we are pleasedto announce that Release 6.5 of eTrust CA-ACF2 <strong>Security</strong> <strong>for</strong> z/<strong>OS</strong> <strong>and</strong> <strong>OS</strong>/<strong>390</strong>addresses numerous Dem<strong>and</strong> Analysis Requests (DARs) that were submitted byboth individual customer sites <strong>and</strong> user groups. We believe that theenhancements in Release 6.5 <strong>and</strong> in related eTrust solutions demonstrate CA’ssecurity leadership <strong>and</strong> commitment to customers <strong>and</strong> quality. As always, wewelcome your feedback <strong>and</strong> your suggestions <strong>for</strong> future product enhancements.February 2003eTrust CA-ACF2 <strong>Security</strong> <strong>for</strong> z/<strong>OS</strong> <strong>and</strong> <strong>OS</strong>/<strong>390</strong>


Section A – InstallationFollow the installation procedures documented in the Release 6.5 eTrustCA-ACF2 <strong>Security</strong> <strong>for</strong> <strong>OS</strong>/<strong>390</strong> <strong>and</strong> z/<strong>OS</strong> Getting Started guide.Installation Changes1. The SMPMCS deck now contains DATA element types replacing'++MAC' element types where appropriate. The new DATA elementtypes include: ++MOD, ++SRC, ++PROC, ++PNL, ++CLIST,++MSG, ++SKL, ++HELP, <strong>and</strong> ++MSGENU. The main impact is thatDATA elements cannot be updated, only replaced.2. If you are installing MAC, the following High Level Assemblermessages can be ignored: ASMA301W, ASMA303W, <strong>and</strong> ASMA435I.Notes regarding eTrust CA-ACF2 Release 6.5 installation processing, JXB2APPAPPLY job:• You can expect to get a return code of four from the JXB2APP job. Youmay see error messages IEW2470E <strong>and</strong> IEW2468E <strong>for</strong> the CAIXJ815 loadmodule; these can be ignored.• You can expect to see IEW2454W warning messages <strong>for</strong> program objectbind processing to the CAI.SMPLTS dataset. These are normal <strong>and</strong> can beignored.Notes regarding eTrust CA-ACF2 Release 6.5 CICS installation processing,CX65APP APPLY job:• You can expect to get a return code of four from the CX65APP job. Youmay also see messages IEC141I <strong>and</strong> IEW2745S; these can be ignored.Important Note <strong>for</strong> JES3 Users:JES3 sites using program pathing will notice additional validations originatingfrom the JES3 address space. The validations specify PGM=IATINTKE <strong>and</strong> aLIB= value corresponding to your JES3 LINKLIB. If GSO LINKLIST recordsare inserted or changed to accommodate these validations anF ACF2,REFRESH(LINKLST) comm<strong>and</strong> must be issued to refresh theLINKLST, <strong>and</strong> the JES3 address space must be recycled to activate theLINKLST change in JES3.Important Note <strong>for</strong> IMS UsersAfter completing the eTrust CA-ACF2 Release 6.5 base maintenance you shouldapply PTF TT65658 to refresh the local copies of base processing modules in theeTrust CA-ACF2 Release 6.5 IMS interface. Refer to the IMSLVL member ofthe ACF2IMS.SAMPJCL data set to install this PTF.February 2003eTrust CA-ACF2 <strong>Security</strong> <strong>for</strong> z/<strong>OS</strong> <strong>and</strong> <strong>OS</strong>/<strong>390</strong>


Important Note <strong>for</strong> eTrust CA-ACF2 <strong>Security</strong> <strong>for</strong> DB2 UsersUsers wishing to reinstall eTrust CA-ACF2 <strong>Security</strong> <strong>for</strong> DB2 <strong>for</strong> any reason onceeTrust CA-ACF2 Release 6.5 is installed must reinstall eTrust CA-ACF2<strong>Security</strong> <strong>for</strong> DB2, Release 1.1 at the SP06 Service pack level. In addition, userswishing to apply any maintenance to eTrust CA-ACF2 <strong>Security</strong> <strong>for</strong> DB2 onceeTrust CA-ACF2 Release 6.5 is installed will first need to reinstall eTrustCA-ACF2 <strong>Security</strong> <strong>for</strong> DB2 Release 1.1 at the SP06 Service pack level.Note to Users of EKC, Inc. ‘s ETF/A 1.6.0 ProductIf your installation uses EKC, Inc.’s ETF/A product at the V1.6.0 level, beadvised that EKC technical support has written ETF/A APAR LD16037(prerequisite APAR is LD16018) to provide support <strong>for</strong> eTrust CA-ACF2Release 6.5. Please contact your EKC, Inc. technical support representativedirectly <strong>for</strong> further in<strong>for</strong>mation.February 2003eTrust CA-ACF2 <strong>Security</strong> <strong>for</strong> z/<strong>OS</strong> <strong>and</strong> <strong>OS</strong>/<strong>390</strong>


Section B - CAIRIM <strong>and</strong> LMP KeysLicense Management Program (LMP)eTrust CA-ACF2 licensing is maintained by the CA License ManagementProgram (LMP). LMP provides a st<strong>and</strong>ardized, automated approach to licensemanagement <strong>and</strong> is designed to eliminate the difficulties inherent in tracking theaccurate licensed use of CA products.LMP runs as a component of CAIRIM. CAIRIM must be installed prior toinitializing eTrust CA-ACF2. If CAIRIM is not running, eTrust CA-ACF2issues message ACF79452. If CAIRIM is not started in 30 minutes, eTrustCA-ACF2 issues this message:ACF79457 CPU nnnnnn REQUIRES A LMP KEY TO RUN PROD(X1)eTrust CA-ACF2 MVSYou should already have received an LMP Product Key Certificate. If you do nothave a valid LMP KEY <strong>for</strong> the CPU on which you are running, CA CommonServices <strong>for</strong> z/<strong>OS</strong> <strong>and</strong> <strong>OS</strong>/<strong>390</strong> message CAS9180E appears on your systemconsole. Once the appropriate key is entered <strong>and</strong> CAIRIM is restarted, enter thefollowing console comm<strong>and</strong>:F ACF2,LMPCHECKeTrust CA-ACF2 immediately verifies the new key. If it is still not valid,another message is generated to your console.If you have any questions about LMP <strong>and</strong> CAIRIM call the CA LicenseManagement Program Hotline at 1-800-338-6720 in North America (24 hours aday, 7 days a week). Outside of North America, contact your local ComputerAssociates Technical Support Center during local business hours.February 2003eTrust CA-ACF2 <strong>Security</strong> <strong>for</strong> z/<strong>OS</strong> <strong>and</strong> <strong>OS</strong>/<strong>390</strong>


END OF PIB PACKETFebruary 2003eTrust CA-ACF2 <strong>Security</strong> <strong>for</strong> z/<strong>OS</strong> <strong>and</strong> <strong>OS</strong>/<strong>390</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!