Given all that has been said here, I would suggest that you
approach it this way -

1.  Determine what is your allowable/acceptable margin for error
(i.e. Walt's points about possible program control, etc, etc).

2.  How "intrusive" can the service be?  Is it acceptable to 
"open" the dataset to check, etc.
(By the way, Wayne pointed out that open was the "easiest" way
to do what you want, not necessarily the least intrusive).

3.  If you have decided to go/stick with doing "proxy checks" (for
want of a better term), then build and test the core module that
performs these checks and make sure it delivers the results you
are seeking.  The point here is to, for the time being at least,
forget about the coms mechanism, until you have something that provides
the required service.

4.  Once you have a service that works, then decide on the communications
mechanism.  If you aren't comfortable with a user SVC or PC routine, perhaps
some form of networking (sockets?) mechanism better suites your needs
and comfort level.

> 
> <snip>
> 
> > Now my routine needs to be called from programs not running 
> > under TSO. The problem is that IKJEFTSR only runs within a
> > TSO environment. <> Suggestions from the IBM Main list were to 
> > create a SVC or PC or use BPX1FRK/BPX1EXM.
> 
> Those are your only legal choices. It is no accident that is
> is hard to get control in an authorized condition. Maintaining
> integrity is more important than making the facilities easy to
> use. Unfortunately, the APF authorized AC(1) job step program is
> a blunt instrument and all of the officially blessed mechanisms
> for call-level authorization are complex to set up and designed
> to be relatively long lived, amortizing their set up costs over
> many interactions.
> 
> There is as yet no formal mechanism for transient requirements
> like yours. One proposal evaluated by z/OS Design is to use the
> security manager to augment authorization checks. In efffect, to
> provide security mediated control over certain functions that 
> currently require APF or higher authorization. I don't know if
> that plan went anywhere, but one of the designers will probably
> tell us. 
> 
> In any case since that option doesn't exist yet it won't do you
> any good right now. Beyond that you should consider the objections
> raised by Ed Jaffe and Walt Farrell. It is surprisingly difficult
> to know specifically what SAF question to ask in order to get the
> right answer in the context of your caller. If you are trying to
> decide whether or not to allow access to a dataset, you may as 
> well avoid the trouble and just use recovery to cover up the S913
> abend.
> 
> CC
> 
> ----------------------------------------------------------------------
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
> Search the archives at http://bama.ua.edu/archives/ibm-main.html
> 

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to