In <listserv%[email protected]>, on 04/02/2010
   at 11:17 AM, Paul Gilmartin <[email protected]> said:

>I've long wondered about this.  Does this mean, in turn, that all
>utilities GIMSMP invokes (IEBCOPY, Binder, Assembler, et al.)  must
>likewise be authorized?

No.

>It is my understanding that an authorized
>program ABENDs if it attempts to ATTACH an unauthorized subtask.

There's no[1] such thing. ATTACH does not check for AC(1) except when
RSAPF=YES is specified by a privileged program. There is, however, a test
for authorized libraries.

[1] Unless you're talking about creating a new job step with its
    own JSCB.

-- 
     Shmuel (Seymour J.) Metz, SysProg and JOAT
     ISO position; see <http://patriot.net/~shmuel/resume/brief.html> 
We don't care. We don't have to care, we're Congress.
(S877: The Shut up and Eat Your spam act of 2003)

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to