Sir,

Please forgive me ... but I simply could not resist.

Do porcupines do 'it' ?? ... really ??. 

When I switched to this field ... it was termed DP (Data Processing).

I do sincerely apologize but for whatever the reason, I read your post
and started cracking up about 'IT'. 

:-)


Kind Regards

Jim Thomas
617-233-4130             (mobile)
636-294-1014                (res)
[email protected] (Email)


-----Original Message-----
From: IBM Mainframe Discussion List [mailto:[email protected]] On Behalf
Of Tony Harminc
Sent: Tuesday, July 19, 2011 8:55 PM
To: [email protected]
Subject: Re: APF and the initiator (IEFIIC)

On 19 July 2011 20:59, Starr, Alan <[email protected]> wrote:

> The subject of an APF-authorized program invoking a program that runs
non-APF-authorized has been discussed many times here. The admonishment not
to turn JSCBAUTH on, after having turned it off, has been repeated many
times.

I think the advice is given and repeated, not because it's an
inherently insecure thing to do, but because getting the details
exactly right in all cases is extremely difficult.

> I wonder how the initiator manages to invoke PGM=apfpgm (APF-authorized)
and then PGM=nonapf (not APF-authorized) for a subsequent step or job.

As with porcupines (or hedgehogs), and how they do it: "very carefully".

Tony H.

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



-----
No virus found in this message.
Checked by AVG - www.avg.com
Version: 10.0.1390 / Virus Database: 1518/3775 - Release Date: 07/19/11

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to