-----Original Message-----
From: IBM Mainframe Discussion List [mailto:[email protected]] On
Behalf Of Walt Farrell
Sent: Tuesday, April 13, 2010 9:44 AM
To: [email protected]
Subject: Re: Heads Up: APAR IO11698 - New SAF FACILITY class definition
required for any SMP/E use

On Tue, 6 Apr 2010 10:39:22 -0500, Walt Farrell <[email protected]>
wrote:

<SNIPPAGE>
Quoting from IO12263:
<quote>
...However, of all the functions described above,
several need to be controlled very carefully.  *Users who are    
granted access to these resources have the potential to         
undermine system security regardless of any data set protections
you may have in place.*  Therefore, they should be as trusted,   
for example, as users who have authority to update APF          
authorized libraries. ... 
[Emphasis and coloring mine]

<SNIPPAGE>

After some discussion here in the office, we are wondering why SMP/E
would be allowed to subvert the protections on data sets (see the bold
in the above quote).

The discussion came down to this sample: If one only has READ authority
to SYS1.LPALIB [or pick one of your favorites for this example], why
should SMP/E allow a USERMOD (or one's own cobbled PTF) to that library?

Now, if the underlying security product (NOT RACF) allows this access
when SMP/E asks, those of us discussing this [here in our offices] don't
think this is an IBM integrity issue.

And given that we are an ISV, we know we will have to inform our L1/2
persons to be aware of the "SMP/E" error messages that will come out and
the questions that will come their way as a result.

Regards,
Steve Thompson

-- Opinions expressed by this poster do not necessarily reflect those of
poster's employer --

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to