On Wed, 22 Jun 2011 09:44:39 -0400, Shmuel Metz (Seymour J.) <[email protected]> wrote:
>In <[email protected]>, on >06/22/2011 > at 08:58 AM, Stan Weyman <[email protected]> said: > >> Are there alternate methods to retaining authorization when running >>under the TMP other than using IKJEFTSR? > >From Rexx you can issue arbitrary TSO commands. There is an >authorization table for commands in addition to the tables for call >and services. I'm not sure what the interface is between the >interpreter and the TMP. I'm pretty sure you'd find that it's IKJEFTSR. -- Walt Farrell IBM STSM, z/OS Security Design ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [email protected] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html

