On Wed, 22 Jun 2011 10:54:48 -0400, Stan Weyman <[email protected]> wrote:

>   You are correct Walt.  I should have said obtain, not retain.  I start
out authorized but lose it as soon as I call the REXX function.  I require
APF for a certain call while in the REXX function.  It does sound like the
TSR is required one way or the other (along with the AUTHTSF entry of course).

I would not expect that calling a REXX function would cause you to lose APF
authorization. I would expect that if the function is not in an appropriate
library that you'd ABEND, or that if REXX doesn't like being invoked
authorized that it would fail your request.

How do you run your APF-authorized program, and how does it invoke the REXX
function?

-- 
Walt Farrell
IBM STSM, z/OS Security Design

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to