Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- 1
- 00:00:00,589 --> 00:00:04,290
- okay we have a different speaker<font color="#CCCCCC"> that's</font>
- 2
- 00:00:04,290 --> 00:00:06,839
- <font color="#E5E5E5">going to cover security server and I'll</font>
- 3
- 00:00:06,839 --> 00:00:08,730
- let Paul introduce themselves<font color="#CCCCCC"> say hello</font>
- 4
- 00:00:08,730 --> 00:00:10,320
- <font color="#E5E5E5">and</font><font color="#CCCCCC"> then we'll go ahead</font><font color="#E5E5E5"> and get started</font>
- 5
- 00:00:10,320 --> 00:00:21,210
- here my name<font color="#E5E5E5"> is Paul Crutzen</font><font color="#CCCCCC"> I work in</font>
- 6
- 00:00:21,210 --> 00:00:24,900
- the I see here in Dallas<font color="#E5E5E5"> actually I'm</font>
- 7
- 00:00:24,900 --> 00:00:28,740
- I'm<font color="#E5E5E5"> actually remote</font><font color="#CCCCCC"> I work a live in</font>
- 8
- 00:00:28,740 --> 00:00:30,689
- Tyler which is about<font color="#E5E5E5"> a hundred miles</font>
- 9
- 00:00:30,689 --> 00:00:32,850
- east<font color="#E5E5E5"> of Dallas but I've worked with the</font>
- 10
- 00:00:32,850 --> 00:00:37,170
- group since<font color="#E5E5E5"> about 2000 so</font><font color="#CCCCCC"> I've</font><font color="#E5E5E5"> been here</font>
- 11
- 00:00:37,170 --> 00:00:40,860
- <font color="#CCCCCC">quite some time my primary role is with</font>
- 12
- 00:00:40,860 --> 00:00:44,329
- early test programs as Paul said so we
- 13
- 00:00:44,329 --> 00:00:47,129
- we work with<font color="#CCCCCC"> free generally available</font>
- 14
- 00:00:47,129 --> 00:00:50,730
- code for ISPs that<font color="#E5E5E5"> want to prepare their</font>
- 15
- 00:00:50,730 --> 00:00:54,329
- products<font color="#E5E5E5"> before we actually release the</font>
- 16
- 00:00:54,329 --> 00:00:58,829
- <font color="#CCCCCC">GA release of</font><font color="#E5E5E5"> z/os and some of the other</font>
- 17
- 00:00:58,829 --> 00:01:00,750
- one of the<font color="#E5E5E5"> other things that I that</font><font color="#CCCCCC"> I've</font>
- 18
- 00:01:00,750 --> 00:01:05,309
- done quite<font color="#E5E5E5"> a lot of in our environment</font>
- 19
- 00:01:05,309 --> 00:01:10,049
- is work with<font color="#E5E5E5"> the security settings or</font>
- 20
- 00:01:10,049 --> 00:01:12,299
- for what we are<font color="#E5E5E5"> required</font><font color="#CCCCCC"> to</font><font color="#E5E5E5"> do within</font>
- 21
- 00:01:12,299 --> 00:01:16,890
- <font color="#E5E5E5">IBM to protect our systems</font><font color="#CCCCCC"> as</font><font color="#E5E5E5"> you might</font>
- 22
- 00:01:16,890 --> 00:01:25,500
- imagine the bringing outside<font color="#CCCCCC"> sessions</font>
- 23
- 00:01:25,500 --> 00:01:28,170
- <font color="#E5E5E5">into from the internet into</font><font color="#CCCCCC"> our</font>
- 24
- 00:01:28,170 --> 00:01:30,840
- environment<font color="#E5E5E5"> does require quite a lot of</font>
- 25
- 00:01:30,840 --> 00:01:33,960
- management<font color="#E5E5E5"> of security so we deal with</font>
- 26
- 00:01:33,960 --> 00:01:36,810
- <font color="#E5E5E5">that quite you know very much all the</font>
- 27
- 00:01:36,810 --> 00:01:42,420
- <font color="#CCCCCC">time we'll just</font><font color="#E5E5E5"> move on forward with</font>
- 28
- 00:01:42,420 --> 00:01:45,049
- with this<font color="#E5E5E5"> presentation this is</font>
- 29
- 00:01:45,049 --> 00:01:49,979
- specifically about the feature<font color="#E5E5E5"> product</font>
- 30
- 00:01:49,979 --> 00:01:53,040
- <font color="#CCCCCC">the optional product called racket</font><font color="#E5E5E5"> part</font>
- 31
- 00:01:53,040 --> 00:01:57,560
- <font color="#E5E5E5">of the security server of z/os</font>
- 32
- 00:02:00,430 --> 00:02:05,770
- so the unit objectives<font color="#CCCCCC"> first we're going</font>
- 33
- 00:02:05,770 --> 00:02:07,600
- <font color="#E5E5E5">to describe the racket authentication</font>
- 34
- 00:02:07,600 --> 00:02:09,820
- process<font color="#E5E5E5"> a little</font><font color="#CCCCCC"> bit about racket in</font>
- 35
- 00:02:09,820 --> 00:02:13,270
- general<font color="#CCCCCC"> we'll talk</font><font color="#E5E5E5"> about sap which</font><font color="#CCCCCC"> is</font>
- 36
- 00:02:13,270 --> 00:02:15,540
- <font color="#E5E5E5">the security authorization facility</font>
- 37
- 00:02:15,540 --> 00:02:18,850
- which<font color="#CCCCCC"> is a base element where racket is</font>
- 38
- 00:02:18,850 --> 00:02:22,300
- an optional feature<font color="#CCCCCC"> we'll look at</font><font color="#E5E5E5"> some</font>
- 39
- 00:02:22,300 --> 00:02:23,680
- <font color="#E5E5E5">of the right depth commands that you can</font>
- 40
- 00:02:23,680 --> 00:02:27,340
- <font color="#E5E5E5">use</font><font color="#CCCCCC"> we'll also look at</font><font color="#E5E5E5"> the options</font><font color="#CCCCCC"> that</font>
- 41
- 00:02:27,340 --> 00:02:30,360
- <font color="#E5E5E5">you can set for racket for the</font>
- 42
- 00:02:30,360 --> 00:02:35,620
- environment itself<font color="#CCCCCC"> we will talk a little</font>
- 43
- 00:02:35,620 --> 00:02:38,340
- <font color="#E5E5E5">bit about protect all which is a</font>
- 44
- 00:02:38,340 --> 00:02:41,290
- <font color="#E5E5E5">something</font><font color="#CCCCCC"> you should know about if</font>
- 45
- 00:02:41,290 --> 00:02:43,690
- you're going<font color="#E5E5E5"> to be maintaining</font><font color="#CCCCCC"> a racket</font>
- 46
- 00:02:43,690 --> 00:02:48,220
- environment<font color="#CCCCCC"> and also the there are</font>
- 47
- 00:02:48,220 --> 00:02:51,240
- utilities that<font color="#CCCCCC"> can be used for</font>
- 48
- 00:02:51,240 --> 00:02:55,740
- administrative<font color="#E5E5E5"> and auditing reports</font>
- 49
- 00:02:55,740 --> 00:02:58,570
- <font color="#CCCCCC">there YouTube there are many</font><font color="#E5E5E5"> utilities</font>
- 50
- 00:02:58,570 --> 00:03:00,820
- that<font color="#E5E5E5"> can be used that's specifically</font>
- 51
- 00:03:00,820 --> 00:03:03,010
- we're going to<font color="#E5E5E5"> look a little bit at the</font>
- 52
- 00:03:03,010 --> 00:03:07,510
- utilities<font color="#CCCCCC"> that you can use for auditor</font>
- 53
- 00:03:07,510 --> 00:03:10,000
- and administrator reporting capabilities
- 54
- 00:03:10,000 --> 00:03:14,019
- and then the last one<font color="#E5E5E5"> would be for a</font>
- 55
- 00:03:14,019 --> 00:03:22,600
- little bit about<font color="#E5E5E5"> passwords so as the</font>
- 56
- 00:03:22,600 --> 00:03:26,890
- name suggests the acronym is<font color="#CCCCCC"> RAC f it</font>
- 57
- 00:03:26,890 --> 00:03:29,350
- stands<font color="#E5E5E5"> for resource access control</font>
- 58
- 00:03:29,350 --> 00:03:32,050
- facility as you can see with the first
- 59
- 00:03:32,050 --> 00:03:33,700
- <font color="#E5E5E5">bullet</font><font color="#CCCCCC"> there it's part of the security</font>
- 60
- 00:03:33,700 --> 00:03:39,269
- server on z/os<font color="#E5E5E5"> but there are other</font>
- 61
- 00:03:39,269 --> 00:03:42,730
- software vendors that have add-on
- 62
- 00:03:42,730 --> 00:03:45,459
- products that can also be<font color="#CCCCCC"> used instead</font>
- 63
- 00:03:45,459 --> 00:03:50,980
- <font color="#E5E5E5">of racket</font><font color="#CCCCCC"> the what I like to point out</font>
- 64
- 00:03:50,980 --> 00:03:54,640
- about racket in general if<font color="#E5E5E5"> you look</font><font color="#CCCCCC"> at</font>
- 65
- 00:03:54,640 --> 00:03:56,320
- the name it sort of tells<font color="#E5E5E5"> you</font><font color="#CCCCCC"> what the</font>
- 66
- 00:03:56,320 --> 00:03:59,950
- design point was the resource in the
- 67
- 00:03:59,950 --> 00:04:03,430
- name was was the part of<font color="#CCCCCC"> the</font><font color="#E5E5E5"> design</font>
- 68
- 00:04:03,430 --> 00:04:09,850
- <font color="#E5E5E5">point of a racket was to as it says to</font>
- 69
- 00:04:09,850 --> 00:04:11,590
- <font color="#E5E5E5">control access</font>
- 70
- 00:04:11,590 --> 00:04:15,129
- <font color="#CCCCCC">two resources rather</font><font color="#E5E5E5"> than focus</font><font color="#CCCCCC"> on a</font>
- 71
- 00:04:15,129 --> 00:04:19,000
- user<font color="#E5E5E5"> or a</font><font color="#CCCCCC"> group of</font><font color="#E5E5E5"> users so if you think</font>
- 72
- 00:04:19,000 --> 00:04:21,880
- <font color="#E5E5E5">of racket you have to realize from a</font>
- 73
- 00:04:21,880 --> 00:04:23,800
- design point<font color="#E5E5E5"> it was always about</font>
- 74
- 00:04:23,800 --> 00:04:26,979
- <font color="#E5E5E5">defining resources and protecting those</font>
- 75
- 00:04:26,979 --> 00:04:31,540
- resources<font color="#E5E5E5"> so</font><font color="#CCCCCC"> we we have gone to</font><font color="#E5E5E5"> quite</font>
- 76
- 00:04:31,540 --> 00:04:36,389
- extensive<font color="#CCCCCC"> levels</font><font color="#E5E5E5"> of resource</font>
- 77
- 00:04:36,389 --> 00:04:40,750
- identification<font color="#E5E5E5"> so that then we</font><font color="#CCCCCC"> can set</font>
- 78
- 00:04:40,750 --> 00:04:42,880
- certain constructs in place to protect
- 79
- 00:04:42,880 --> 00:04:46,030
- those<font color="#CCCCCC"> resources</font><font color="#E5E5E5"> once they are protected</font>
- 80
- 00:04:46,030 --> 00:04:49,389
- you give access<font color="#E5E5E5"> control through racket</font>
- 81
- 00:04:49,389 --> 00:04:51,490
- to those resources<font color="#CCCCCC"> so that's sort of</font><font color="#E5E5E5"> the</font>
- 82
- 00:04:51,490 --> 00:04:55,630
- <font color="#E5E5E5">design point rather than focusing on</font><font color="#CCCCCC"> a</font>
- 83
- 00:04:55,630 --> 00:05:01,210
- user and giving<font color="#E5E5E5"> access from a user</font>
- 84
- 00:05:01,210 --> 00:05:09,060
- standpoint we obviously<font color="#E5E5E5"> we part of the</font>
- 85
- 00:05:09,810 --> 00:05:13,150
- responsibility<font color="#E5E5E5"> of any security product</font>
- 86
- 00:05:13,150 --> 00:05:14,800
- would be<font color="#E5E5E5"> to identify</font><font color="#CCCCCC"> on</font><font color="#E5E5E5"> authenticate</font>
- 87
- 00:05:14,800 --> 00:05:20,530
- users<font color="#CCCCCC"> then we would authorize</font><font color="#E5E5E5"> users as I</font>
- 88
- 00:05:20,530 --> 00:05:24,250
- said to those protected resources<font color="#E5E5E5"> but</font>
- 89
- 00:05:24,250 --> 00:05:27,070
- <font color="#E5E5E5">you also need</font><font color="#CCCCCC"> to</font><font color="#E5E5E5"> be able to log and</font>
- 90
- 00:05:27,070 --> 00:05:31,650
- report unauthorized access so that
- 91
- 00:05:31,650 --> 00:05:35,080
- <font color="#E5E5E5">auditors administrators can maintain the</font>
- 92
- 00:05:35,080 --> 00:05:37,800
- system and<font color="#CCCCCC"> also report</font><font color="#E5E5E5"> potential</font>
- 93
- 00:05:37,800 --> 00:05:41,229
- violations<font color="#E5E5E5"> one thing that it doesn't say</font>
- 94
- 00:05:41,229 --> 00:05:44,710
- here is that<font color="#E5E5E5"> you can also report on</font>
- 95
- 00:05:44,710 --> 00:05:49,380
- authorized access<font color="#CCCCCC"> and some auditing</font>
- 96
- 00:05:49,380 --> 00:05:54,669
- firms and internal auditing groups they
- 97
- 00:05:54,669 --> 00:05:57,880
- want to know at<font color="#E5E5E5"> 11:00 a certain level</font>
- 98
- 00:05:57,880 --> 00:06:02,340
- <font color="#E5E5E5">what actually the authorized access was</font>
- 99
- 00:06:02,340 --> 00:06:07,210
- so it is another<font color="#E5E5E5"> level of reporting</font><font color="#CCCCCC"> it's</font>
- 100
- 00:06:07,210 --> 00:06:09,000
- not something that<font color="#E5E5E5"> we typically get</font>
- 101
- 00:06:09,000 --> 00:06:11,800
- involved in<font color="#E5E5E5"> but an auditor likes to see</font>
- 102
- 00:06:11,800 --> 00:06:16,360
- those kinds<font color="#E5E5E5"> of reports</font><font color="#CCCCCC"> and we obviously</font>
- 103
- 00:06:16,360 --> 00:06:18,250
- <font color="#E5E5E5">you know we control the means of access</font>
- 104
- 00:06:18,250 --> 00:06:20,820
- <font color="#CCCCCC">to these resources</font>
- 105
- 00:06:23,110 --> 00:06:26,840
- just a little<font color="#E5E5E5"> bit of overview about how</font>
- 106
- 00:06:26,840 --> 00:06:30,199
- <font color="#CCCCCC">rap</font><font color="#E5E5E5"> is put together as you can see in</font>
- 107
- 00:06:30,199 --> 00:06:31,990
- the middle<font color="#CCCCCC"> of the screen</font>
- 108
- 00:06:31,990 --> 00:06:36,470
- this represents<font color="#E5E5E5"> the racket feature and</font>
- 109
- 00:06:36,470 --> 00:06:40,550
- you see there<font color="#E5E5E5"> is a racket database</font><font color="#CCCCCC"> the</font>
- 110
- 00:06:40,550 --> 00:06:42,889
- racket database contains the constructs
- 111
- 00:06:42,889 --> 00:06:46,130
- <font color="#CCCCCC">for the protected</font><font color="#E5E5E5"> resources and</font><font color="#CCCCCC"> also it</font>
- 112
- 00:06:46,130 --> 00:06:51,979
- <font color="#E5E5E5">contains the user ID identification</font><font color="#CCCCCC"> and</font>
- 113
- 00:06:51,979 --> 00:06:54,500
- the rules that<font color="#E5E5E5"> are</font><font color="#CCCCCC"> in place for</font><font color="#E5E5E5"> each of</font>
- 114
- 00:06:54,500 --> 00:06:59,810
- <font color="#CCCCCC">those in this</font><font color="#E5E5E5"> particular diagram</font><font color="#CCCCCC"> at the</font>
- 115
- 00:06:59,810 --> 00:07:02,510
- <font color="#CCCCCC">top you see</font><font color="#E5E5E5"> that there is</font><font color="#CCCCCC"> a security</font>
- 116
- 00:07:02,510 --> 00:07:04,520
- administrator the security administrator
- 117
- 00:07:04,520 --> 00:07:08,840
- is<font color="#CCCCCC"> responsible for making the</font>
- 118
- 00:07:08,840 --> 00:07:12,850
- definitions that that a customer<font color="#CCCCCC"> has</font>
- 119
- 00:07:12,850 --> 00:07:15,470
- defined<font color="#E5E5E5"> either with their</font><font color="#CCCCCC"> management or</font>
- 120
- 00:07:15,470 --> 00:07:19,130
- their security team about<font color="#E5E5E5"> what how the</font>
- 121
- 00:07:19,130 --> 00:07:22,840
- system needs to<font color="#E5E5E5"> be</font><font color="#CCCCCC"> implemented from</font>
- 122
- 00:07:22,840 --> 00:07:25,340
- which which<font color="#E5E5E5"> resources need to be</font>
- 123
- 00:07:25,340 --> 00:07:30,039
- <font color="#E5E5E5">protected and at what level users are</font>
- 124
- 00:07:30,039 --> 00:07:35,360
- <font color="#E5E5E5">given access</font><font color="#CCCCCC"> to</font><font color="#E5E5E5"> the resources on this</font>
- 125
- 00:07:35,360 --> 00:07:38,389
- side you see that<font color="#CCCCCC"> there's a user that</font>
- 126
- 00:07:38,389 --> 00:07:40,599
- <font color="#CCCCCC">needs</font><font color="#E5E5E5"> some sort</font><font color="#CCCCCC"> of authentication</font>
- 127
- 00:07:40,599 --> 00:07:44,930
- <font color="#E5E5E5">obviously they interact with the racket</font>
- 128
- 00:07:44,930 --> 00:07:47,060
- system based on what the<font color="#E5E5E5"> system</font>
- 129
- 00:07:47,060 --> 00:07:49,490
- administrator has<font color="#CCCCCC"> set up</font><font color="#E5E5E5"> for the</font>
- 130
- 00:07:49,490 --> 00:07:52,280
- protection<font color="#CCCCCC"> of that resource</font><font color="#E5E5E5"> and what the</font>
- 131
- 00:07:52,280 --> 00:07:54,080
- management<font color="#E5E5E5"> team has defined for this</font>
- 132
- 00:07:54,080 --> 00:07:58,220
- particular user<font color="#E5E5E5"> we give</font><font color="#CCCCCC"> for refused</font>
- 133
- 00:07:58,220 --> 00:08:01,550
- access<font color="#E5E5E5"> to</font><font color="#CCCCCC"> the resource and at the end of</font>
- 134
- 00:08:01,550 --> 00:08:04,550
- <font color="#E5E5E5">the day some reports may be generated</font>
- 135
- 00:08:04,550 --> 00:08:08,270
- that an auditor can look at and see what
- 136
- 00:08:08,270 --> 00:08:12,250
- kind of violations might occurred
- 137
- 00:08:15,680 --> 00:08:18,490
- just a<font color="#E5E5E5"> little bit more about how that</font>
- 138
- 00:08:18,490 --> 00:08:21,169
- this is put together within<font color="#E5E5E5"> the system</font>
- 139
- 00:08:21,169 --> 00:08:23,120
- and<font color="#E5E5E5"> we'll talk a</font><font color="#CCCCCC"> little</font><font color="#E5E5E5"> bit more</font><font color="#CCCCCC"> about</font>
- 140
- 00:08:23,120 --> 00:08:25,759
- the security<font color="#E5E5E5"> authorization facility this</font>
- 141
- 00:08:25,759 --> 00:08:29,810
- <font color="#E5E5E5">is called SAP</font><font color="#CCCCCC"> and it is not an optional</font>
- 142
- 00:08:29,810 --> 00:08:33,830
- feature<font color="#E5E5E5"> as you can see it sits in the</font>
- 143
- 00:08:33,830 --> 00:08:36,620
- <font color="#E5E5E5">middle of this chart this</font><font color="#CCCCCC"> is part of</font><font color="#E5E5E5"> the</font>
- 144
- 00:08:36,620 --> 00:08:42,490
- base<font color="#CCCCCC"> operating system and as this chart</font>
- 145
- 00:08:42,490 --> 00:08:48,950
- suggests<font color="#E5E5E5"> a request comes in for</font>
- 146
- 00:08:48,950 --> 00:08:51,890
- permission<font color="#E5E5E5"> it goes through some resource</font>
- 147
- 00:08:51,890 --> 00:08:56,300
- manager that has the this is<font color="#E5E5E5"> making a</font>
- 148
- 00:08:56,300 --> 00:08:59,570
- standard call to the security
- 149
- 00:08:59,570 --> 00:09:01,610
- <font color="#E5E5E5">authorization facility those calls are</font>
- 150
- 00:09:01,610 --> 00:09:04,240
- standard the security authorization
- 151
- 00:09:04,240 --> 00:09:06,770
- facility sits here if rack F is
- 152
- 00:09:06,770 --> 00:09:11,020
- installed it will<font color="#E5E5E5"> access racket through</font>
- 153
- 00:09:11,020 --> 00:09:16,640
- system<font color="#E5E5E5"> authorization and</font><font color="#CCCCCC"> rack F will do</font>
- 154
- 00:09:16,640 --> 00:09:19,279
- a database<font color="#CCCCCC"> query give the results back</font>
- 155
- 00:09:19,279 --> 00:09:22,130
- to<font color="#CCCCCC"> the of</font><font color="#E5E5E5"> the query back to SAP SAP</font>
- 156
- 00:09:22,130 --> 00:09:26,390
- makes<font color="#E5E5E5"> a standard return back to the</font>
- 157
- 00:09:26,390 --> 00:09:29,810
- caller and the<font color="#E5E5E5"> permission is either</font>
- 158
- 00:09:29,810 --> 00:09:32,330
- denied or permitted based on what the
- 159
- 00:09:32,330 --> 00:09:36,200
- recommendation was if racket is not
- 160
- 00:09:36,200 --> 00:09:39,800
- present this may be another<font color="#E5E5E5"> security</font>
- 161
- 00:09:39,800 --> 00:09:44,060
- product there<font color="#E5E5E5"> are exits that and I think</font>
- 162
- 00:09:44,060 --> 00:09:45,589
- <font color="#CCCCCC">it's on may be</font><font color="#E5E5E5"> on the</font><font color="#CCCCCC"> net one of the</font>
- 163
- 00:09:45,589 --> 00:09:48,950
- next<font color="#E5E5E5"> boils or charts here but there are</font>
- 164
- 00:09:48,950 --> 00:09:53,089
- exit points that are available<font color="#E5E5E5"> from SAP</font>
- 165
- 00:09:53,089 --> 00:09:57,920
- <font color="#CCCCCC">so that another vendor security product</font>
- 166
- 00:09:57,920 --> 00:10:00,079
- can<font color="#CCCCCC"> be plugged in if</font><font color="#E5E5E5"> if that was</font>
- 167
- 00:10:00,079 --> 00:10:06,650
- preferred by<font color="#CCCCCC"> the customer</font><font color="#E5E5E5"> and this gives</font>
- 168
- 00:10:06,650 --> 00:10:08,029
- you a little<font color="#E5E5E5"> bit more information on</font>
- 169
- 00:10:08,029 --> 00:10:12,920
- outside it<font color="#E5E5E5"> is part of z/os once again as</font>
- 170
- 00:10:12,920 --> 00:10:15,649
- I said<font color="#E5E5E5"> if</font><font color="#CCCCCC"> bracket is</font><font color="#E5E5E5"> there it will use</font>
- 171
- 00:10:15,649 --> 00:10:19,060
- <font color="#CCCCCC">rack F to do the authorization checks</font>
- 172
- 00:10:19,060 --> 00:10:23,420
- <font color="#E5E5E5">but it can use an optional extra routine</font>
- 173
- 00:10:23,420 --> 00:10:26,990
- which there are these there are<font color="#E5E5E5"> standard</font>
- 174
- 00:10:26,990 --> 00:10:27,950
- places that
- 175
- 00:10:27,950 --> 00:10:32,470
- that can be connected to other<font color="#E5E5E5"> products</font>
- 176
- 00:10:32,470 --> 00:10:37,100
- <font color="#E5E5E5">and once again it gives us a layer that</font>
- 177
- 00:10:37,100 --> 00:10:40,130
- enables resource management to<font color="#E5E5E5"> make</font>
- 178
- 00:10:40,130 --> 00:10:44,090
- standard calls so<font color="#CCCCCC"> that they're there</font>
- 179
- 00:10:44,090 --> 00:10:46,060
- <font color="#E5E5E5">don't have to</font><font color="#CCCCCC"> be</font><font color="#E5E5E5"> direct calls or</font>
- 180
- 00:10:46,060 --> 00:10:49,820
- <font color="#E5E5E5">customized calls made</font><font color="#CCCCCC"> to a</font><font color="#E5E5E5"> product</font>
- 181
- 00:10:49,820 --> 00:10:52,370
- either<font color="#CCCCCC"> a</font><font color="#E5E5E5"> cap or one of the other</font>
- 182
- 00:10:52,370 --> 00:10:55,190
- <font color="#CCCCCC">security products we don't have to we</font>
- 183
- 00:10:55,190 --> 00:10:58,580
- you<font color="#E5E5E5"> don't have to make a different call</font>
- 184
- 00:10:58,580 --> 00:10:59,960
- <font color="#E5E5E5">depending on the product that's</font>
- 185
- 00:10:59,960 --> 00:11:07,220
- installed<font color="#E5E5E5"> okay</font><font color="#CCCCCC"> we'll talk</font><font color="#E5E5E5"> a little bit</font>
- 186
- 00:11:07,220 --> 00:11:11,980
- about<font color="#E5E5E5"> racket administration</font><font color="#CCCCCC"> there are</font>
- 187
- 00:11:11,980 --> 00:11:31,430
- I'm sorry I'm sorry<font color="#E5E5E5"> there was</font><font color="#CCCCCC"> a question</font>
- 188
- 00:11:31,430 --> 00:11:34,160
- <font color="#E5E5E5">in the room about</font><font color="#CCCCCC"> PKI services and</font>
- 189
- 00:11:34,160 --> 00:11:35,870
- whether<font color="#E5E5E5"> or not that</font><font color="#CCCCCC"> was a separate</font>
- 190
- 00:11:35,870 --> 00:11:39,770
- capability or or it was something that
- 191
- 00:11:39,770 --> 00:11:42,520
- <font color="#E5E5E5">is controlled by racket and we do have</font>
- 192
- 00:11:42,520 --> 00:11:45,800
- <font color="#CCCCCC">bracket</font><font color="#E5E5E5"> does</font><font color="#CCCCCC"> store certificates and can</font>
- 193
- 00:11:45,800 --> 00:11:49,210
- provide that level of authentication
- 194
- 00:11:50,620 --> 00:11:55,640
- anything else all right
- 195
- 00:11:55,640 --> 00:12:00,800
- um as I said<font color="#E5E5E5"> administration of racket</font>
- 196
- 00:12:00,800 --> 00:12:03,890
- can happen in multiple<font color="#E5E5E5"> ways here there</font>
- 197
- 00:12:03,890 --> 00:12:07,850
- is an<font color="#E5E5E5"> ispf interface that gives</font><font color="#CCCCCC"> a</font>
- 198
- 00:12:07,850 --> 00:12:13,030
- <font color="#CCCCCC">full-screen</font><font color="#E5E5E5"> ispf panel administration</font>
- 199
- 00:12:13,030 --> 00:12:16,280
- capability there are also racket
- 200
- 00:12:16,280 --> 00:12:19,310
- commands<font color="#E5E5E5"> that can</font><font color="#CCCCCC"> be executed</font><font color="#E5E5E5"> either</font>
- 201
- 00:12:19,310 --> 00:12:22,820
- through through TSO or through<font color="#CCCCCC"> batch</font>
- 202
- 00:12:22,820 --> 00:12:25,190
- with a with<font color="#E5E5E5"> the terminal monitor</font><font color="#CCCCCC"> program</font>
- 203
- 00:12:25,190 --> 00:12:29,900
- and also<font color="#CCCCCC"> the</font><font color="#E5E5E5"> console has some</font><font color="#CCCCCC"> specific</font>
- 204
- 00:12:29,900 --> 00:12:31,910
- type commands<font color="#E5E5E5"> that</font><font color="#CCCCCC"> can be an issue</font><font color="#E5E5E5"> to</font>
- 205
- 00:12:31,910 --> 00:12:34,160
- rack up and<font color="#E5E5E5"> I think we talked a little</font>
- 206
- 00:12:34,160 --> 00:12:37,720
- bit about that<font color="#E5E5E5"> somewhere along the</font><font color="#CCCCCC"> way</font>
- 207
- 00:12:37,720 --> 00:12:40,579
- there are also utilities that<font color="#E5E5E5"> are</font>
- 208
- 00:12:40,579 --> 00:12:44,149
- provided with<font color="#CCCCCC"> the product</font><font color="#E5E5E5"> as again as I</font>
- 209
- 00:12:44,149 --> 00:12:45,529
- <font color="#CCCCCC">said we'll look at a couple of these</font>
- 210
- 00:12:45,529 --> 00:12:50,449
- that give<font color="#CCCCCC"> you detailed reports</font><font color="#E5E5E5"> on how</font>
- 211
- 00:12:50,449 --> 00:12:53,740
- <font color="#E5E5E5">the database</font><font color="#CCCCCC"> has been</font><font color="#E5E5E5"> defined and also</font>
- 212
- 00:12:53,740 --> 00:12:58,970
- <font color="#E5E5E5">on how the some some of the constructs</font>
- 213
- 00:12:58,970 --> 00:13:01,130
- are put together for<font color="#E5E5E5"> different users</font><font color="#CCCCCC"> and</font>
- 214
- 00:13:01,130 --> 00:13:08,779
- groups<font color="#CCCCCC"> I think this next charge</font><font color="#E5E5E5"> is an</font>
- 215
- 00:13:08,779 --> 00:13:13,389
- example<font color="#E5E5E5"> of the primary racket</font>
- 216
- 00:13:13,389 --> 00:13:19,149
- administration<font color="#CCCCCC"> panel on our system</font><font color="#E5E5E5"> the</font>
- 217
- 00:13:19,149 --> 00:13:22,940
- <font color="#E5E5E5">verb to</font><font color="#CCCCCC"> use would be equal or if you're</font>
- 218
- 00:13:22,940 --> 00:13:25,519
- on a panel you<font color="#E5E5E5"> can enter equal</font><font color="#CCCCCC"> R and</font>
- 219
- 00:13:25,519 --> 00:13:28,370
- you'll see this primary option<font color="#CCCCCC"> menu</font>
- 220
- 00:13:28,370 --> 00:13:31,250
- <font color="#CCCCCC">within racket as you can see there are</font>
- 221
- 00:13:31,250 --> 00:13:35,630
- multiple selections that it's just it's
- 222
- 00:13:35,630 --> 00:13:37,730
- similar<font color="#CCCCCC"> to other panels within ISPs</font>
- 223
- 00:13:37,730 --> 00:13:42,260
- <font color="#E5E5E5">where you drill down and as you the</font>
- 224
- 00:13:42,260 --> 00:13:44,120
- farther you drill the the more
- 225
- 00:13:44,120 --> 00:13:45,800
- information<font color="#E5E5E5"> that you're required to</font>
- 226
- 00:13:45,800 --> 00:13:48,740
- <font color="#E5E5E5">provide and we'll talk about some of</font>
- 227
- 00:13:48,740 --> 00:13:50,839
- <font color="#E5E5E5">these</font><font color="#CCCCCC"> different capabilities</font><font color="#E5E5E5"> will also</font>
- 228
- 00:13:50,839 --> 00:13:55,100
- look at them in command form<font color="#E5E5E5"> but</font><font color="#CCCCCC"> at the</font>
- 229
- 00:13:55,100 --> 00:13:58,130
- <font color="#E5E5E5">very just mention here</font><font color="#CCCCCC"> that there are</font>
- 230
- 00:13:58,130 --> 00:14:00,230
- different<font color="#E5E5E5"> types of profiles there</font>
- 231
- 00:14:00,230 --> 00:14:02,300
- something here called data<font color="#E5E5E5"> set profiles</font>
- 232
- 00:14:02,300 --> 00:14:05,740
- which we use<font color="#E5E5E5"> quite extensively</font><font color="#CCCCCC"> and it is</font>
- 233
- 00:14:05,740 --> 00:14:10,569
- <font color="#E5E5E5">it's been provided as sort of a separate</font>
- 234
- 00:14:10,569 --> 00:14:14,269
- resource profile function then<font color="#E5E5E5"> you see</font>
- 235
- 00:14:14,269 --> 00:14:15,680
- <font color="#E5E5E5">something called</font><font color="#CCCCCC"> general resource</font>
- 236
- 00:14:15,680 --> 00:14:18,800
- profiles<font color="#CCCCCC"> those are profiles that again</font>
- 237
- 00:14:18,800 --> 00:14:20,510
- when you're talking<font color="#CCCCCC"> about protecting</font>
- 238
- 00:14:20,510 --> 00:14:25,010
- <font color="#E5E5E5">resources there is</font><font color="#CCCCCC"> a vast array of</font>
- 239
- 00:14:25,010 --> 00:14:27,529
- different<font color="#CCCCCC"> types of</font><font color="#E5E5E5"> resources</font><font color="#CCCCCC"> that we can</font>
- 240
- 00:14:27,529 --> 00:14:29,720
- that we<font color="#E5E5E5"> can protect and we'll talk a</font>
- 241
- 00:14:29,720 --> 00:14:31,370
- little<font color="#E5E5E5"> bit</font><font color="#CCCCCC"> about those but to give you</font>
- 242
- 00:14:31,370 --> 00:14:35,569
- an example we can<font color="#E5E5E5"> protect hardware</font>
- 243
- 00:14:35,569 --> 00:14:40,190
- resources at one time is<font color="#CCCCCC"> as you can</font>
- 244
- 00:14:40,190 --> 00:14:44,209
- <font color="#CCCCCC">imagine we had physical terminals that</font>
- 245
- 00:14:44,209 --> 00:14:46,370
- <font color="#E5E5E5">were attached to the system table</font>
- 246
- 00:14:46,370 --> 00:14:48,860
- <font color="#E5E5E5">directly to a control unit</font>
- 247
- 00:14:48,860 --> 00:14:52,010
- <font color="#E5E5E5">table</font><font color="#CCCCCC"> directly to the</font><font color="#E5E5E5"> processor before</font>
- 248
- 00:14:52,010 --> 00:14:56,120
- we had tcp/ip before we had internet
- 249
- 00:14:56,120 --> 00:14:57,560
- before<font color="#CCCCCC"> we had</font><font color="#E5E5E5"> all those kinds of</font>
- 250
- 00:14:57,560 --> 00:15:00,350
- <font color="#E5E5E5">connections well in many</font><font color="#CCCCCC"> cases those</font>
- 251
- 00:15:00,350 --> 00:15:04,540
- <font color="#E5E5E5">terminals</font><font color="#CCCCCC"> to give you a hardware example</font>
- 252
- 00:15:04,540 --> 00:15:07,190
- <font color="#CCCCCC">depending</font><font color="#E5E5E5"> on where the physical terminal</font>
- 253
- 00:15:07,190 --> 00:15:10,280
- <font color="#E5E5E5">was located if you take a for</font><font color="#CCCCCC"> example in</font>
- 254
- 00:15:10,280 --> 00:15:13,160
- a bank<font color="#CCCCCC"> if there was a terminal the</font>
- 255
- 00:15:13,160 --> 00:15:14,810
- physical terminal located<font color="#CCCCCC"> in a</font>
- 256
- 00:15:14,810 --> 00:15:18,550
- particular<font color="#CCCCCC"> areas</font><font color="#E5E5E5"> it would it would be</font>
- 257
- 00:15:18,550 --> 00:15:21,410
- defined<font color="#E5E5E5"> to</font><font color="#CCCCCC"> rack up at the terminal level</font>
- 258
- 00:15:21,410 --> 00:15:25,460
- which will require<font color="#CCCCCC"> logon and based on</font>
- 259
- 00:15:25,460 --> 00:15:27,350
- authentication you may or<font color="#CCCCCC"> may not be</font>
- 260
- 00:15:27,350 --> 00:15:28,850
- able<font color="#CCCCCC"> to use that terminal another</font>
- 261
- 00:15:28,850 --> 00:15:31,610
- example<font color="#CCCCCC"> would be in operations two even</font>
- 262
- 00:15:31,610 --> 00:15:34,280
- <font color="#E5E5E5">today</font><font color="#CCCCCC"> you have a terminal that's sitting</font>
- 263
- 00:15:34,280 --> 00:15:38,000
- <font color="#E5E5E5">in the tape library</font><font color="#CCCCCC"> many times</font><font color="#E5E5E5"> that's</font>
- 264
- 00:15:38,000 --> 00:15:40,490
- separate from<font color="#CCCCCC"> the system console</font><font color="#E5E5E5"> area in</font>
- 265
- 00:15:40,490 --> 00:15:44,420
- a customer environment so a tape
- 266
- 00:15:44,420 --> 00:15:46,940
- <font color="#E5E5E5">operator doesn't have</font><font color="#CCCCCC"> necessarily the</font>
- 267
- 00:15:46,940 --> 00:15:50,960
- same authentication<font color="#CCCCCC"> but doesn't</font><font color="#E5E5E5"> have the</font>
- 268
- 00:15:50,960 --> 00:15:54,110
- <font color="#E5E5E5">same level of security that</font><font color="#CCCCCC"> a system</font>
- 269
- 00:15:54,110 --> 00:15:56,840
- operator<font color="#E5E5E5"> would have so if a tape</font>
- 270
- 00:15:56,840 --> 00:15:58,850
- operator<font color="#E5E5E5"> is</font><font color="#CCCCCC"> in tape operations</font><font color="#E5E5E5"> and</font>
- 271
- 00:15:58,850 --> 00:16:01,280
- they're<font color="#E5E5E5"> required to log</font><font color="#CCCCCC"> onto a console</font>
- 272
- 00:16:01,280 --> 00:16:03,530
- <font color="#E5E5E5">they log on</font><font color="#CCCCCC"> with their credentials</font>
- 273
- 00:16:03,530 --> 00:16:05,690
- <font color="#CCCCCC">they're able to</font><font color="#E5E5E5"> issue tape operator</font>
- 274
- 00:16:05,690 --> 00:16:08,900
- commands and they're not allowed<font color="#CCCCCC"> to</font>
- 275
- 00:16:08,900 --> 00:16:10,940
- issue some of the other types<font color="#E5E5E5"> of modify</font>
- 276
- 00:16:10,940 --> 00:16:12,590
- commands<font color="#E5E5E5"> that</font><font color="#CCCCCC"> the</font><font color="#E5E5E5"> pilot has shown you</font>
- 277
- 00:16:12,590 --> 00:16:15,740
- that our system type commands<font color="#CCCCCC"> command</font>
- 278
- 00:16:15,740 --> 00:16:17,660
- <font color="#CCCCCC">line epaulet your explanation was really</font>
- 279
- 00:16:17,660 --> 00:16:19,280
- good and<font color="#E5E5E5"> what I was thinking about was</font>
- 280
- 00:16:19,280 --> 00:16:22,790
- we even<font color="#E5E5E5"> protect commands themselves so</font>
- 281
- 00:16:22,790 --> 00:16:25,910
- for<font color="#E5E5E5"> example on our system here we</font>
- 282
- 00:16:25,910 --> 00:16:28,340
- protect commands<font color="#E5E5E5"> and because we protect</font>
- 283
- 00:16:28,340 --> 00:16:31,040
- commands<font color="#E5E5E5"> we can make a rack up statement</font>
- 284
- 00:16:31,040 --> 00:16:33,710
- <font color="#E5E5E5">the resources the command and we can</font>
- 285
- 00:16:33,710 --> 00:16:36,140
- make<font color="#CCCCCC"> statements and save you as a user</font>
- 286
- 00:16:36,140 --> 00:16:38,750
- <font color="#E5E5E5">your user ID are allowed to do display</font>
- 287
- 00:16:38,750 --> 00:16:41,270
- commands but you're not allowed<font color="#CCCCCC"> to do</font>
- 288
- 00:16:41,270 --> 00:16:43,790
- <font color="#E5E5E5">commands that very</font><font color="#CCCCCC"> hard we're off</font><font color="#E5E5E5"> and on</font>
- 289
- 00:16:43,790 --> 00:16:47,800
- or modify the environment<font color="#CCCCCC"> so</font><font color="#E5E5E5"> resources</font>
- 290
- 00:16:47,800 --> 00:16:50,120
- <font color="#E5E5E5">commands</font><font color="#CCCCCC"> as a resource</font><font color="#E5E5E5"> and then we get</font>
- 291
- 00:16:50,120 --> 00:16:53,600
- granularity within their display in<font color="#CCCCCC"> vs.</font>
- 292
- 00:16:53,600 --> 00:16:56,360
- modified such would that be a pretty
- 293
- 00:16:56,360 --> 00:16:58,820
- good<font color="#E5E5E5"> example</font><font color="#CCCCCC"> exactly in other types of</font>
- 294
- 00:16:58,820 --> 00:17:00,480
- resources<font color="#CCCCCC"> for example</font>
- 295
- 00:17:00,480 --> 00:17:03,930
- <font color="#E5E5E5">our UNIX system services</font><font color="#CCCCCC"> resources so</font>
- 296
- 00:17:03,930 --> 00:17:07,709
- <font color="#CCCCCC">that they don't</font><font color="#E5E5E5"> fit into a category</font><font color="#CCCCCC"> of</font>
- 297
- 00:17:07,709 --> 00:17:10,949
- data set it's a file<font color="#E5E5E5"> within unit system</font>
- 298
- 00:17:10,949 --> 00:17:15,829
- services<font color="#CCCCCC"> you may have - the volumes that</font>
- 299
- 00:17:15,829 --> 00:17:19,679
- <font color="#CCCCCC">are</font><font color="#E5E5E5"> physical volumes that we may or may</font>
- 300
- 00:17:19,679 --> 00:17:21,750
- not allow certain users to<font color="#CCCCCC"> access</font>
- 301
- 00:17:21,750 --> 00:17:24,740
- because<font color="#CCCCCC"> we don't want them to be able to</font>
- 302
- 00:17:24,740 --> 00:17:27,059
- you know<font color="#E5E5E5"> make a change on the volume</font>
- 303
- 00:17:27,059 --> 00:17:30,120
- <font color="#E5E5E5">there may be a different</font><font color="#CCCCCC"> level of</font><font color="#E5E5E5"> access</font>
- 304
- 00:17:30,120 --> 00:17:32,220
- to<font color="#E5E5E5"> a volume where you could initialize</font>
- 305
- 00:17:32,220 --> 00:17:35,640
- it versus<font color="#E5E5E5"> read it or write</font><font color="#CCCCCC"> it ok so</font>
- 306
- 00:17:35,640 --> 00:17:37,799
- there's there is<font color="#CCCCCC"> a tremendous</font><font color="#E5E5E5"> amount of</font>
- 307
- 00:17:37,799 --> 00:17:43,290
- <font color="#CCCCCC">control as you</font><font color="#E5E5E5"> can imagine but it gives</font>
- 308
- 00:17:43,290 --> 00:17:47,220
- us the flexibility to protect the system
- 309
- 00:17:47,220 --> 00:17:51,390
- adequately<font color="#CCCCCC"> the next thing that</font><font color="#E5E5E5"> you see</font>
- 310
- 00:17:51,390 --> 00:17:53,070
- on this panel is something called group
- 311
- 00:17:53,070 --> 00:17:56,090
- profiles and user<font color="#E5E5E5"> to group connections</font>
- 312
- 00:17:56,090 --> 00:17:59,059
- <font color="#CCCCCC">we'll talk a little</font><font color="#E5E5E5"> bit</font><font color="#CCCCCC"> about groups</font><font color="#E5E5E5"> but</font>
- 313
- 00:17:59,059 --> 00:18:02,220
- the option for there is user profiles
- 314
- 00:18:02,220 --> 00:18:07,620
- <font color="#E5E5E5">and passwords and you would I would like</font>
- 315
- 00:18:07,620 --> 00:18:10,620
- <font color="#CCCCCC">me I prefer</font><font color="#E5E5E5"> to talk about users first we</font>
- 316
- 00:18:10,620 --> 00:18:13,350
- authenticate at the user ID level you
- 317
- 00:18:13,350 --> 00:18:17,100
- can use passwords that we have<font color="#E5E5E5"> passwords</font>
- 318
- 00:18:17,100 --> 00:18:19,140
- set up here that are<font color="#CCCCCC"> 8 characters you</font>
- 319
- 00:18:19,140 --> 00:18:21,990
- can also use<font color="#E5E5E5"> passphrases</font><font color="#CCCCCC"> if you so</font>
- 320
- 00:18:21,990 --> 00:18:24,090
- desire to set that<font color="#E5E5E5"> up</font><font color="#CCCCCC"> we don't</font><font color="#E5E5E5"> have that</font>
- 321
- 00:18:24,090 --> 00:18:29,179
- <font color="#CCCCCC">turned on</font><font color="#E5E5E5"> in our system but groups</font><font color="#CCCCCC"> as</font>
- 322
- 00:18:29,179 --> 00:18:34,460
- you might imagine<font color="#E5E5E5"> are groups of users so</font>
- 323
- 00:18:34,460 --> 00:18:37,260
- there can be many<font color="#CCCCCC"> many group profiles</font>
- 324
- 00:18:37,260 --> 00:18:40,590
- set up on the system groups<font color="#E5E5E5"> can</font><font color="#CCCCCC"> be you</font>
- 325
- 00:18:40,590 --> 00:18:42,929
- <font color="#E5E5E5">can give</font><font color="#CCCCCC"> access to resources at the</font>
- 326
- 00:18:42,929 --> 00:18:45,120
- group<font color="#CCCCCC"> level or are specifically</font><font color="#E5E5E5"> at the</font>
- 327
- 00:18:45,120 --> 00:18:50,100
- user level<font color="#CCCCCC"> a user</font><font color="#E5E5E5"> may be</font><font color="#CCCCCC"> a</font><font color="#E5E5E5"> part of</font>
- 328
- 00:18:50,100 --> 00:18:53,130
- <font color="#E5E5E5">multiple</font><font color="#CCCCCC"> groups</font><font color="#E5E5E5"> so you'll see some of</font>
- 329
- 00:18:53,130 --> 00:18:56,880
- <font color="#CCCCCC">the some of the in some of the displays</font>
- 330
- 00:18:56,880 --> 00:18:59,610
- <font color="#CCCCCC">that we show different names for groups</font>
- 331
- 00:18:59,610 --> 00:19:01,500
- there's a group called sis<font color="#E5E5E5"> one there's a</font>
- 332
- 00:19:01,500 --> 00:19:03,480
- group called<font color="#CCCCCC"> Group one there may be a</font>
- 333
- 00:19:03,480 --> 00:19:05,910
- group called<font color="#E5E5E5"> Group Z you could be a</font>
- 334
- 00:19:05,910 --> 00:19:08,549
- member<font color="#CCCCCC"> of</font><font color="#E5E5E5"> group one without being a</font>
- 335
- 00:19:08,549 --> 00:19:10,860
- member<font color="#CCCCCC"> of group</font><font color="#E5E5E5"> two or vice versa</font><font color="#CCCCCC"> you</font>
- 336
- 00:19:10,860 --> 00:19:12,690
- could be a member<font color="#CCCCCC"> of both group wanting</font>
- 337
- 00:19:12,690 --> 00:19:16,320
- group<font color="#CCCCCC"> two group one could be assigned to</font>
- 338
- 00:19:16,320 --> 00:19:19,710
- a resource<font color="#CCCCCC"> that group two does not know</font>
- 339
- 00:19:19,710 --> 00:19:23,130
- anything<font color="#E5E5E5"> about and depending on what</font>
- 340
- 00:19:23,130 --> 00:19:26,130
- <font color="#E5E5E5">users are in those groups they would</font>
- 341
- 00:19:26,130 --> 00:19:28,320
- those those users would only get access
- 342
- 00:19:28,320 --> 00:19:30,870
- <font color="#E5E5E5">to the resources</font><font color="#CCCCCC"> that those groups would</font>
- 343
- 00:19:30,870 --> 00:19:34,560
- have access<font color="#CCCCCC"> to</font><font color="#E5E5E5"> okay the other things</font>
- 344
- 00:19:34,560 --> 00:19:39,420
- here there's a system options<font color="#CCCCCC"> and we'll</font>
- 345
- 00:19:39,420 --> 00:19:41,010
- talk a little<font color="#E5E5E5"> bit</font><font color="#CCCCCC"> about system options</font>
- 346
- 00:19:41,010 --> 00:19:43,920
- those<font color="#E5E5E5"> are the</font><font color="#CCCCCC"> options that you</font><font color="#E5E5E5"> use to</font>
- 347
- 00:19:43,920 --> 00:19:47,880
- customize<font color="#CCCCCC"> Rock F itself and the remote</font>
- 348
- 00:19:47,880 --> 00:19:49,530
- sharing facility we're not going<font color="#CCCCCC"> to</font><font color="#E5E5E5"> get</font>
- 349
- 00:19:49,530 --> 00:19:52,380
- <font color="#E5E5E5">into that too much just so you know that</font>
- 350
- 00:19:52,380 --> 00:19:55,910
- it<font color="#E5E5E5"> is we do have the capability to</font>
- 351
- 00:19:55,910 --> 00:20:00,780
- target other<font color="#CCCCCC"> RAC</font><font color="#E5E5E5"> F databases and</font><font color="#CCCCCC"> RAC F</font>
- 352
- 00:20:00,780 --> 00:00:00,000
- systems
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement