On 3/10/2006 9:25 AM, [EMAIL PROTECTED] wrote:
I'm no security expert, but the impression I get from other products that do security checking on behalf of other users, is that, as someone earlier posted, a RACROUTE is performed using the subject's userid. It seems inappropriate to have to muck with the TCB.

He is trying to establish a different security environment within his server, in which all requests made by the system need to be processed as a different user. He is not making a request on behalf of another user.

In that situation, he needs to do the same kinds of things that the system would do, including manipulating the TCB.

        Walt Farrell, CISSP
        z/OS Security Design, IBM

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to