On Mon, 5 Apr 2010 13:51:27 -0500, Pommier, Rex R. wrote:
>
>How's this for a near-real-time scenario.
>
> ...
>They are authorized to put stuff into the SMPPTS but they cannot run
>REJECT commands (because they might grab something that is in the
>process of being installed.  So they need access to the RECEIVE command
>but nothing else.  Just protecting the datasets won't give us that
>granularity.
>
OTOH, consider a relatively small shop where one systems
programmer (or a few) do all the maintenance: RECEIVE, REJECT,
APPLY, RESTORE, UCLIN.  Only they have write access to the
SMP/E CSI and associated data sets.  Everyone has read access
in order to do LIST commands and browse.  The security
administrator is satisfied with this protection of the data
sets.  Is it then satisfactory to permit UACC(READ) on all
the SMP/E facilities?  If not, why not?  What else must the
security administrator consider?  I'd still like to see an
answer from an IBM representative.

I'm still extremely puzzled that this facility, which appears
to be an enhancement, is issued as a HIPER integrity APAR.

It seems that there's something IBM isn't telling us.  But,
then, Jim and Walt have already told us that they're not
telling us.

Repeating, the operant question is, what, besides the
protection of the data sets must the security administrator
consider?

-- gil

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to