Edward E. Jaffe wrote:
Steve Grimes wrote:

I apologize in advance for not knowing the best list to send this question to. (Perhaps ISPF-L? But I'm not a subscriber there.) I'm proposing to our systems folks that we allow a "user" to use TSO to get to the Zeke Work Center function. I'm being told that there is no way for us to limit what the user can do if we let them intoTSO.


Sounds like bullshirt to me. Any user with ATTRIBUTES=RESTRICTED will require that _every function_ they need be explicitly authorized, regardless of any existing UACC settings.

One of the things to keep in mind, simply restricting what menus they see in ISPF by restricting the logon PROC, even if you do auto logoff when they exit ISPF, doesn't really restrict what they can do in TSO/ISPF as long as they have access to an ISPF command line from which any TSO command or program in LINKLST can be potentially invoked; and many ISPF panels support a command line or have menu pulldowns that may lead to such panels.

You would want to guarantee through appropriate RACF security (like RESTRICTED with minimal explicit RACF permits mentioned by Edward) that they have no access to any datasets they don't need and that they can't access any programs other than the ones they need for their intended function. It ought to be possible, but to give them the minimal required access will no doubt require a tedious repetitive process to gradually add all the needed permits to DATASET and PROGRAM profiles until they can do what is required without being blocked at some point by RACF access failure messages. Depending on the ISPF application, you could run into situations where granting access to some program or dataset required by the ISPF dialog might also open up avenues for abuse from the ISPF command line.

In order to run ISPF they will have to have UPDATE access to a user ISPF PROFILE PDS (or PDSE) dataset. If they have any way to introduce their own member into that dataset (batch, TSO EDIT, ISPF EDIT, etc.), they could potentially use a REXX program to display many parts of COMMON storage, probably not a serious breach in most installations, but a potential unintended capability.



--
Joel C. Ewing, Fort Smith, AR        [EMAIL PROTECTED]

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to