On Wed, 22 Jun 2011 09:44:39 -0400, Shmuel Metz (Seymour J.)
<[email protected]> wrote:

>In <[email protected]>, on
>06/22/2011
>   at 08:58 AM, Stan Weyman <[email protected]> said:
>
>>  Are there alternate methods to retaining authorization when running
>>under the TMP other than using IKJEFTSR?
>
>From Rexx you can issue arbitrary TSO commands. There is an
>authorization table for commands in addition to the tables for call
>and services. I'm not sure what the interface is between the
>interpreter and the TMP. 

I'm pretty sure you'd find that it's IKJEFTSR. 

--
Walt Farrell
IBM STSM, z/OS Security Design

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to