Mark,

There has been quite a bit if speculation about "why" IBM made this change. 
What was the integrity issue.

Like you, I was mildly curious. A lot of good people have made a lot of good 
points and now I have become very curious.


As you and others have said, RACF DATASET protection can be used to prevent 
users from making updates. Assuming that all SMP/E, target, distribution and 
APF-authorized datasets are properly protected, there shouldn't be an issue.

As many have said, RACF PADS can be used to limit those who may invoke SMP/E.

I believe that there is a general consensus that it probably isn't solely 
related to the fact that GIMSMP runs AC(1). As we all know, if you cannot trust 
staff that has UPDATE access to an APF-authorized library, then all bets are 
off. I am unaware of any special access that GIMSMP would have when executed by 
a user who cannot normally update the datasets / HFS files affected by APPLY.

At first I thought that a clever user could copy the SMP/E datasets and thereby 
get around the UPDATE protection (i.e. execute APPLY or ACCEPT using their copy 
of the SMP/E environment). But, so what? Who cares if they modify their own 
copies of the SMP/E environment? The target and distribution libraries will not 
be updated by any of the utilities that SMP/E invokes because SAF will prevent 
it.



All of this lead me to believe that the issue may not be as critical as getting 
unauthorized access to a dataset or, worse, AC(1) capabilities. It is more 
likely a consideration that is specific to SMP/E commands. I therefore very 
much like your "stretch" hypothesis and would like to offer my own:

Many of us are more cautious with ACCEPT than we are with APPLY. ACCEPT can 
delete things (e.g. SMPPTS members and TLIBs). More importantly, ACCEPT can 
modify an object in a distribution dataset that could conceivably be INCLUDEd 
into some other product that is installed into a different zone. Perhaps, in 
some large shop, an untested MOD was ACCEPTed into a DLIB and subsequently 
pulled into another product's LMOD (via an APPLY in some other zone), which 
then fell over. Just a thought, but I can "stretch" to envision some customers 
wanting to control those who may ACCEPT (i.e. limit it to a subset of those who 
may APPLY).

Happy Easter all!
Alan     

-----Original Message-----
From: IBM Mainframe Discussion List [mailto:[email protected]] On Behalf Of 
Mark Zelden
Sent: Friday, April 02, 2010 06:46
To: [email protected]
Subject: Re: Heads Up: APAR IO11698 - New SAF FACILITY class definition 
required for any SMP/E use

On Fri, 2 Apr 2010 10:41:36 +0000, Bob Shannon <[email protected]>
wrote:

>We applied the APAR. We protect the SMP data. I'm sort of baffled why 
>IBM
felt SAF support was necessary for SMPE.
>
>Since we are a development shop in which dozens of people use SMPE, we
simply set the access to UACC(READ) which gives everyone access to all of the 
SMP/E commands.
>

It's not necessary, but I can "stretch" and see the case where a shop might 
want to let an ID or group have RECEIVE authority for example, but not let them 
to do an APPLY or not let them perform admin functions.  Perhaps a production 
userid that does RECEIVE ORDER via a job scheduler on a nightly or weekly 
basis. 

For query only, the CSI can simply be protected from update via RACF data set 
profiles.

I'd be mildly curious to know where the requirement came from.  

Mark
--
Mark Zelden - Zelden Consulting Services - z/OS, OS/390 and MVS       
mailto:[email protected]                                          
Mark's MVS Utilities: http://home.flash.net/~mzelden/mvsutil.html
Systems Programming expert at http://expertanswercenter.techtarget.com/

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
[email protected] with the message: GET IBM-MAIN INFO Search the archives at 
http://bama.ua.edu/archives/ibm-main.html

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to