>UserKey 9 can write into CICSKey 8? that cannot be correct 
>as all DFH modules would be up for overwriting.  Where 
>would integrity be?

FWIW, "system integrity" is not a factor since in the CICS case the key 9 
user has permission to get into key 8 and do whatever a key 8 user can do.
Reliability is the reason for this function. 

Peter Relson
z/OS Core Technology Design

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to