In <listserv%[email protected]>, on 04/02/2010
at 11:17 AM, Paul Gilmartin <[email protected]> said:
>I've long wondered about this. Does this mean, in turn, that all
>utilities GIMSMP invokes (IEBCOPY, Binder, Assembler, et al.) must
>likewise be authorized?
No.
>It is my understanding that an authorized
>program ABENDs if it attempts to ATTACH an unauthorized subtask.
There's no[1] such thing. ATTACH does not check for AC(1) except when
RSAPF=YES is specified by a privileged program. There is, however, a test
for authorized libraries.
[1] Unless you're talking about creating a new job step with its
own JSCB.
--
Shmuel (Seymour J.) Metz, SysProg and JOAT
ISO position; see <http://patriot.net/~shmuel/resume/brief.html>
We don't care. We don't have to care, we're Congress.
(S877: The Shut up and Eat Your spam act of 2003)
----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html