Your Browser is not longer supported

Please use Google Chrome, Mozilla Firefox or Microsoft Edge to view the page correctly
Loading...

{{viewport.spaceProperty.prod}}

Structure of the members FTADM and FTACADM

&pagelevel(5)&pagelevel

The members FTADM and FTACADM contain all the users (user IDs) who possess FT or FTAC administrator authorization. Each entry must start on a new line in column 1. User ID groups that differ only in the associated suffix and which all possess the same
authorizations can be combined using wildcards "*". For example, the user IDs XORG001, XORG002 and XORG003 can be represented by a single entry XORG*.

If you enter administration commands at the console or use Netview then a pseudo-entry Console must be set up in these members.

In FTACADM, it is possible to assign FTAC administrators what FTAC considers to be "system administrator rights". The restrictions applying to the setup and import of admission profiles for external user IDs do not apply to these administrators. To assign this privilege, enter SU after the user ID in column 10/11.

WARNING!

FTAC administrators with the "SU privilege" can set up appropriate admission profiles allowing them to access the files belonging to any user ID and, in this way, circumvent any protection policies that may be in place! For this reason, it is necessary to treat write access rights to the FT parameter library with considerable care.

If the PARM library does not exist at the time the FJGEN command is called, openFT creates the members FTADM and FTACADM during FJGEN execution. These are then assigned the OPENFT USER ID and the pseudo-entry "Console". The members may be modified (e.g. other user IDs may be entered in them). Changes take effect the next time openFT is loaded or when the FTUPDPAR command is issued. FTADM and FTACADM may each contain up to 100 entries.