In a recent note, Bob Rutledge said:

> Date:         Sat, 20 Aug 2005 10:30:19 -0400
> 
> Paul Gilmartin wrote:
> >
> > o The default OMVS UID should, by default, be defined in base
> >   MVS systems.
> >
> > o That definition should be built in in such a way that ace admins
> >   might be able to change its value, or its shell, but never to
> >   delete it.
> >
> > I wonder what Walt F. says?
> 
> Sorry, I should have mentioned that the security softare is CA-TSS.  Not 
> Walt's
> problem!
> 
Somewhat an afterthought, but as I envisioned it, by "base MVS"
I meant the kernel, outside any *ACF* product.  Something like:

   DUB: Query security product for user's UID
        if failure then query security product for default UID
        if failure then UID=-2  /* customary value for "nobody" */

The intent is that the admin can supply a default UID if desired;
if not, the system will use its builtin value.

> library and the stack is Interlink/Sterling/CA's.  Makes problem determination
> more challenging.
> 
Also makes sequestering of the default OMVS UID more challenging.
Obviously, if a third party ISV supplies a functionally equivalent
replacement for OMVS, not just for TCP/IP or RACF, that party would
control the behavior of the default UID.  The risk is low.

Regard OMVS nowadays as comparable to JES.  A site can't just
turn off JES if it chooses to operate without it.  Nor can a
site deny selected users access to JES facilities.  (Imagine
JES querying *ACF* to determine that each requesting user has
a JES segment in his *ACF* definition; yet that's how OMVS
operates.)  (And I am aware of no ISV replacements for JES.)

-- gil
-- 
StorageTek
INFORMATION made POWERFUL

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to