> -----Original Message-----
> From: IBM Mainframe Discussion List 
> [mailto:[EMAIL PROTECTED] On Behalf Of Paul Gilmartin
> Sent: Friday, January 13, 2006 9:35 AM
> To: [email protected]
> Subject: Re: limited Numbers of TSO users on z/OS.e
> 
> 
> In a recent note, Peter Relson said:
> 

<snip> 

> 
> Often the mode of enforcement selected by an authority serves to
> clarify an elliptical definition.  IBM provided some enforcement
> of the limit.  It seems it would have been easy enough to impose
> a limit of 8 concurrent tasks (or 8 concurrent address spaces) 
> running the TSO TMP.  IBM chose instead to enforce a limit of 8
> concurrent uses of a particular interface to the TMP.  By choosing
> that point of enforcement, IBM implicitly provided the missing
> definition.
> 
> When I posted my earlier contribution to this thread I was tempted
> to add that if products that bypass the limit become prevalent,
> IBM will likely redesign its enforcement.  That option remains
> available to IBM.
> 
> Contrariwise, IBM has provided a new interface to the TMP, in the
> poorly understood "address TSO" subcommand environment of Rexx
> EXECs run under z/OS Unix shells.  With very simple descriptor
> plumbing, this can be escalated into a fairly interactive session.
> Would this violate the limit as you appear to see it?  (My
> experiments did not strain the parameter: our site is licensed
> for full z/OS.)
> 

Now this might be "interesting" to play around with for an uber geek.
Have a REXX exec running under a z/OS UNIX shell via telnet (not the TSO
OMVS command). The z/OS UNIX shell was invoked via a "specialized"
telnet client written especially for the following functionality. The
REXX exec does an ADDRESS TSO to run a REXX program which invokes an APF
authorized command processor. This command processor sets up an SVC
subsystem screening environment to "trap" all the TSO terminal related
SVCs. The REXX exec then sets up and invokes ISPF. The SVC screening
code sends information back to the z/OS UNIX shell, which basically just
goes back to that specialized telnet client. The telnet client uses the
information to create a 3270 like display (using curses, QT,
something-else). This is likely complicated and stupid to do. But it
seems to me that conceptually, this could effectively "get around" the 8
user TSO limit without actually violating the licence. HOWERVER, I have
not read the z/OS.e license, nor am I a lawyer!

<snip>

--
John McKown
Senior Systems Programmer
UICI Insurance Center
Information Technology

This message (including any attachments) contains confidential
information intended for a specific individual and purpose, and its
content is protected by law.  If you are not the intended recipient, you
should delete this message and are hereby notified that any disclosure,
copying, or distribution of this transmission, or taking any action
based on it, is strictly prohibited.
 

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to