That processing is part of IKJEFTSR, Shmuel. I suppose one -could- build an
appropriate parm list and directly ATTACH the TSO/E CALL command, which (I
think) would result in CALL using IKJEFTSR on your behalf. But of course the
intended way for you to invoke the CALL command is via IKJEFTSR directly.
And via IKJEFTSR you could simply invoke IDCAMS without using CALL.
So if you know a way that doesn't directly or indirectly involve IKJEFTSR
I'd like to hear.
--
Walt Farrell
IBM STSM, z/OS Security Design
----------------------------------------------------------------------
What IDCAMS function requires authorization?
I wrote a program that uses SVC 26 to simulate IDCAMS "DELETE xxx ALIAS" and
it worked without any authorization.
Yes, I know...the SVC 26 parameter list is not documented for customer use.
The only request that I have run into that requires authorization is
SUPERLOCATE to obtain all the volumes for a given data set.
Even that can be circumvented by issuing a regular LISTCAT with an
appropriate CTGFL and a large format 2 work area.
Dan
----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html