My opinion.... There are bits in control blocks which will allow the access you seek. An exit, such as an ACF2 exit, would have authority to fiddle with those bits. The control block(s) involved are protected by storage protect key - thus to fiddle with those bits requires APF authorization and/or supervisor state. In other words, an overt customer action would be required to allow this to happen - an overt action to bypass integrity controls.
In my opinion, a system upon which such an exit was permitted to be installed would be a system which cannot comply with IBM's Statement of Integrity for z/OS, and thus the advice from many on this list to you is absolutely correct. DO NOT TRY TO DO THIS. If you do so, you are compromising the integrity of your entire z/OS operating system. Given your email address, I would think your organization would not tolerate such a compromise - a deliberate circumvention of z/OS integrity which we on this list believe cannot be mitigated against. Brian On Fri, 23 Apr 2010 10:55:52 -0400, Bathmaker, Jon wrote: >Hi All, > >We have a need to grant security to a class of users they log on to a >specific app. We want them to lose it when they log off. > >Ideally there will be a nice exit somewhere where we can set the >security bit in memory just after the user has logged onto the app. >Thanks. > >Best Regards, >Jon Bathmaker ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [email protected] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html

