I love following these discussions, though I don't use this stuff at all in my 
line of work.  

I have a list of all the subpools (tacked to my wall, of course), but where do 
I find the documentation that explains these keys and what they do?

Kind regards,
Lindy


-----Original Message-----
From: IBM Mainframe Discussion List [mailto:[email protected]] On Behalf Of 
Peter Relson
Sent: Wednesday, November 09, 2011 2:25 PM
To: [email protected]
Subject: Re: How to enable Storage Protection Override?

>UserKey 9 can write into CICSKey 8? that cannot be correct as all DFH 
>modules would be up for overwriting.  Where would integrity be?

FWIW, "system integrity" is not a factor since in the CICS case the key 9 user 
has permission to get into key 8 and do whatever a key 8 user can do.
Reliability is the reason for this function. 

Peter Relson
z/OS Core Technology Design

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to