On 19 July 2011 20:59, Starr, Alan <[email protected]> wrote:

> The subject of an APF-authorized program invoking a program that runs 
> non-APF-authorized has been discussed many times here. The admonishment not 
> to turn JSCBAUTH on, after having turned it off, has been repeated many times.

I think the advice is given and repeated, not because it's an
inherently insecure thing to do, but because getting the details
exactly right in all cases is extremely difficult.

> I wonder how the initiator manages to invoke PGM=apfpgm (APF-authorized) and 
> then PGM=nonapf (not APF-authorized) for a subsequent step or job.

As with porcupines (or hedgehogs), and how they do it: "very carefully".

Tony H.

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to