> Your confusion is due to an unfortunate use of the word "resource" in
> two wholly-different contexts.

> You're getting waaay off track here...

I'm confused and off track? Please do not attacking me personally.

I got into this discussion just to highlight the inconsistency of two
arguments. In one case it was argued that any user who used a resource must
need it to do their job, otherwise they would never have used it. In the
other case, it's argued that all resources should be protected, and only
specific authorizations given out, because accidents and bad intentions
happen.

The resources involved are different, but the reasons for protecting them
are essentially the same.

If the business requires that a user access a specific set of resources,
and no other resources, then the other resources have to be protected.

If the business would like a user to access a set of resources and would
like (but not require) them NOT to access other resources, then a note
saying, "Please don't touch these other resources" might suffice.

Each business' requirements are different. Perhaps the originator is
satisfied with a logon proc that only points Joe user to Zeke. Maybe the
requestor isn't interested in the myriad methods of bypassing security, and
is only interested in satisfying the immediate needs of Joe user. After
all, the original request said, "I'm hoping no RACF changes will be
required, except perhaps for authorization to execute the sign-on proc."

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to