Professional Documents
Culture Documents
A.
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
B.
C.
D.
1.
2.
3.
GROUP IDS.................................................................................................................................................................................. 11
CONNECT A RACF USER TO A GROUP ID .................................................................................................................................................... 11
REMOVE A RACF GROUP ID CONNECTION ................................................................................................................................................. 12
LIST RACF INFORMATION FOR A SPECIFIC GROUP ID ..................................................................................................................................... 13
1.
2.
3.
4.
5.
6.
7.
8.
9.
1.
2.
3.
E.
F.
G.
H.
TC REPORTS ................................................................................................................................................................................ 62
1.
VIEW LIST OF TECHNICAL COORDINATORS (TCS) ......................................................................................................................................... 63
2.
LOOK-UP TCS FOR A SPECIFIC GROUP ........................................................................................................................................................ 63
I.
Page 1 of 65
Page 2 of 65
Some of the keys used for basic navigation includeThe directional Arrow keys [Up], [Down], [Left], and [Right] allow you to move the cursor one character
in the specified direction.
[Tab] key Used to move the cursor forward (left to right, top to bottom) to the next input field on the
screen.
[Shift] + [Tab] keys Used to move backward (right to left, bottom to top) to the previous input field on
the screen.
Function (F1-12) keys These act as a substitute for the 24 PF keys which exist on the IBM keyboard
used with the 3270 terminal. They are still occasionally referred to as PF keys.
o The F1 function key is typically a Help function.
o The F2 function key is typically a Split Screen function. It creates two screens for viewing.
o [Shift]+F2 function key will exit a TSO session and display the MAI menu (only if MAI is used).
o The F3 function key is typically a Back or Exit function.
o The F7 function key is typically a Page Up function.
o The F8 function key is typically a Page Down function.
o The F9 function key is typically a Toggle function used to manage multiple screens.
o The F10 function key is typically a Page Left function.
o The F11 function key is typically a Page Right function.
Typing the PFSHOW command will toggle on/off a list of available function keys on the bottom two (2)
lines of your screen.
Finally, the screen (or panel) is a grid pattern. The screen size can be changed in the emulator settings, however the
default is 24 characters high (rows) by 80 characters long (columns).
Page 3 of 65
Before the individual options are described, please notice the top and bottom lines of the screen. There are several
important items to remember:
Title: This is the top line of the screen. It is a short description of the screen you are currently in.
Command Line: This line appears in many of the screens. This is where you will enter screen options and
type commands.
LOCATION/SYSPLEX: This is where in HOST/mainframe you are logged on. The most common locations
are SP01(US) and SP02(INTL).
F1 Function Key: This takes you to the help menu. Nearly every screen in TCRACF has its own unique
help menu. Be sure to use F1 if you ever have a question.
F3 Function Key: This is how you exit or go back a screen.
TIME: The time relative to the system you are logged on to. This is displayed as Military Time which
runs in 24- rather than 12- hour increments. (16:43 military time is 4:43pm standard time)
Page 4 of 65
Page 5 of 65
4. Generic ID Maintenance
This screen is to create generic IDs for stores, clubs, and distribution centers.
Page 6 of 65
6. CICS Reports
This screen allows you to display information about CICS transactions/screens and their related PF keys. You will
be able to see the access list, owning TC, description, and more.
Page 7 of 65
8. TC Reports
This screen allows you to view a list of TCs or to locate a TC for a specific group.
Page 8 of 65
Page 9 of 65
C. Generic IDs
This section of TCRACF has not yet been updated and is the same as the original code. Please refer to the original
TCRACF documentation for assistance.
Page 10 of 65
TCRACF will return a message stating if your request was successful or if there was an error. Additionally, for
successful commands, it will display all groups the user ID is connected to.
Page 11 of 65
TCRACF will return a message stating if your request was successful or if there was an error. Additionally, for
successful commands, it will display all groups the user ID is connected to.
Page 12 of 65
The report is shown below. Some groups, like the one in this example, are called UNIVERSAL groups. This means
the group can be connected to more than 5957 user IDs. In this report, only user IDs with elevated authority (like TCs) will
be displayed for UNIVERSAL groups.
Page 13 of 65
TCRACF will return the current status and information for the user ID. As always, use the help screen; it will
provide descriptions of what all the fields mean.
Page 14 of 65
EXPIRED: Press [Tab] once to move your cursor to the action field. Type Y for reset and press [Enter].
Page 15 of 65
Page 16 of 65
Page 17 of 65
Page 18 of 65
The 3rd screen is where you begin selecting where, and what applications, the individual will be able to access. This
is a high level selection which will guide you through screens asking for more specific details for each access type.
Only the appropriate fields should be selected. Some individuals will not need any additional access and you will
not select any fields before hitting [Enter]. We have selected all options here only to present to you all the available screens.
Page 19 of 65
Page 20 of 65
Page 21 of 65
This screen allows you to specify what type of schemas in Remedy the individual should have access to. You may
select as many as apply or leave all fields blank and the individual will not receive access to Remedy.
Page 22 of 65
The default Windows password is Walmart1. The default Unix password is walmart. The Mainframe does not
have a default password, so a random password is generated and displayed on this screen. All default passwords must be
changed when the user logs on for the first time.
Never send user ID and password combinations in email, instant manager (IM) applications, or by other electronic
means. Because, in this instance, you would be sending the default password, the user wont be able to logon and get the
information anyway. Either speak directly with the individual (in person or by a phone call) or write down the user ID and
password(s) and hand it directly to them.
Page 23 of 65
If a match is found, you will be taken to this confirmation screen to validate this is the correct ID you wish to rehire.
Page 24 of 65
The following screen is a continuation where you will provide additional information about the individual in
general. Again, all fields are required and must have information entered before you can move forward in the process.
Page 25 of 65
The 3 screen is where you begin selecting where, and what applications, the rehired individual will be able to
access. This is a high level selection which will guide you through screens asking for more specific details for each access
type.
Only the appropriate fields should be selected. Some individuals will not need any additional access and you will
not select any fields before hitting [Enter]. We have selected all options here only to present to you all the available screens.
Page 26 of 65
Page 27 of 65
Page 28 of 65
This screen allows you to specify what type of schemas in Remedy the individual should have access to. You may
select as many as apply or leave all fields blank and the individual will not receive access to Remedy.
Page 29 of 65
The default Windows password is Walmart1. The default Unix password is walmart. The Mainframe does not
have a default password, so a random password is generated and displayed on this screen. All default passwords must be
changed when the user logs on for the first time.
Never send user ID and password combinations in email, instant manager (IM) applications, or by other electronic
means. Because, in this instance, you would be sending the default password, the user wont be able to logon and get the
information anyway. Either speak directly with the individual (in person or by a phone call) or write down the user ID and
password(s) and hand it directly to them.
Page 30 of 65
This screen looks up the user ID, displays identifying information, and asks you to confirm that this is the correct ID
you wish to disable.
Page 31 of 65
There is no screen displayed for mainframe/Host access. This process will completely disable the mainframe
account. If you only need to remove pieces of their mainframe access, go to option 2 from the main menu.
The next screen is to disable access to the various Unix servers. You may choose to disable all Unix server access by
selecting the first option; or you may disable access to specific Unix server(s) by typing in the server name(s) in the provided
space(s).
Page 32 of 65
This screen is to disable access to the global sourcing applications. Select which individual applications need to be
disabled or select disable all to disable all global sourcing access for the user ID.
Page 33 of 65
This screen is to disable access to the various other PC based applications which dont fall under any other
category. Select which individual applications need to be disabled or select disable all to disable access to all PC based
applications listed for the user ID.
Page 34 of 65
Page 35 of 65
Page 36 of 65
The next screen will ask where the individual is transferring from and where the individual is transferring to. All
fields are required.
Page 37 of 65
The 4th screen is where you begin selecting where, and what applications, the individual will be able to access after
the transfer. This is a high level selection which will guide you through screens asking for more specific details for each
access type.
Only the appropriate fields should be selected. Some individuals will not need any additional access and you will
not select any fields before hitting [Enter]. We have selected all options here only to present to you all the available screens.
Page 38 of 65
Page 39 of 65
Page 40 of 65
This screen allows you to specify what type of schemas in Remedy the individual should have access to. You may
select as many as apply or leave all fields blank and the individual will not receive access to Remedy.
Page 41 of 65
This screen allows you to grant access to the various applications which access information stored in one of the
Teradata databases. The workstation ID and physical location are required fields. You will have to specify if they only need
access to the data (option 1) or if they are a developer and will also need access to the test version (option 2) of the
application and database.
Page 42 of 65
This is the confirmation screen. It tells you what the user ID will be for the individual (User IDs will always be 5 to
7 characters long.) and approximately when the various access requests will be processed.
To proceed and process the request, you must type Y in the confirmation field located at the bottom of the screen.
Page 43 of 65
Page 44 of 65
This screen looks up the user ID, displays identifying information, and asks you to confirm that this is the correct ID
you wish to issue a domain move for.
Page 45 of 65
This is the confirmation screen. It reiterates what domain the user ID will be moved to. To proceed and process the
request, you must type Y in the confirmation field located at the bottom of the screen.
Page 46 of 65
Page 47 of 65
This screen looks up the user ID, displays identifying information, and asks you to confirm that this is the correct ID
you wish to modify.
Page 48 of 65
The following screen is a continuation where you will provide additional information about the individual in
general. Again, all fields are required and must have information entered before you can move forward in the process.
Page 49 of 65
Page 50 of 65
This screen allows you to modify what type of schemas in Remedy the individual should have access to. Select as
many schemas as apply.
Page 51 of 65
This screen allows you to modify their access to the applications which access data stored in one of the various
Teradata databases. If you select FACT or JEWEL an additional screen will appear to gather more details for those specific
applications.
Page 52 of 65
Page 53 of 65
This is the confirmation screen. It tells you approximately when the various access requests will be processed. To
proceed and process the request, you must type Y in the confirmation field located at the bottom of the screen.
Page 54 of 65
Page 55 of 65
TCRACF will return a list of all profiles which that transaction appears in. The Class is loosely related to the
individual CICS regions and is what makes it possible for a transaction to appear multiple times. Use the help menu to
determine which profile you should select. When ready, tab down to the desired profile, type S (for Select) and then press
[Enter].
Page 56 of 65
Page 57 of 65
TCRACF will return a list of all PF (function) key profiles for that transaction. In the profile, the first four (4)
characters are the transaction name and the last characters represent the PF key. When ready, tab down to the desired
profile, type S (for Select) and then press [Enter].
Page 58 of 65
Page 59 of 65
This is the final screen providing the report. It lists all CICS transactions and PF (function) keys which the user ID
has access to. As always, use the help screen; it will provide descriptions of what all the fields mean.
Page 60 of 65
1. Option 1
This option is currently unavailable. It is being reserved for future enhancements to TCRACF.
Page 61 of 65
H. TC Reports
Page 62 of 65
Page 63 of 65
1. Options 1 and 2.
These options will display a list of Unix servers. The Old Style list is manually maintained and may not contain the
newest servers. This list may eventually be removed from the options. The New Style list is automatically updated every
night and should be a more accurate listing.
Page 64 of 65
Page 65 of 65