Well, since we all know the answers this is simply a discussion. But, Yes, that Is what I want to do... or more specifically what I want to discuss.
x = foo( bar) where foo is an assembler function running authorized. But I know two ways to do this that do not violate any system integrity rules. -----Original Message----- From: IBM Mainframe Discussion List [mailto:[email protected]] On Behalf Of Shmuel Metz (Seymour J.) Sent: Friday, December 31, 2010 7:29 PM To: [email protected] Subject: Re: Authorized Rexx Assembler Function In <[email protected]>, on 12/31/2010 at 02:56 PM, Lindy Mayfield <[email protected]> said: >That is exactly what I meant by my question. Rexx assembler function, >authorized properly, put into the TSO command IKJTSOxx table, won't run >authorized. If you really mean function, then there is no mechanism, nor should there be. IKJTSOxx is for authorized commands, authorized programs and authorized services, not for functions. Are you saying that you want to write foo=bar(baz) or call bar baz rather than address TSO bar baz and have baz run authorized? -- Shmuel (Seymour J.) Metz, SysProg and JOAT ISO position; see <http://patriot.net/~shmuel/resume/brief.html> We don't care. We don't have to care, we're Congress. (S877: The Shut up and Eat Your spam act of 2003) ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [email protected] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [email protected] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html

