On Tue, 19 Sep 2006 13:40:58 -0300 "Shmuel Metz (Seymour J.)"
<[EMAIL PROTECTED]> wrote:

:>In <[EMAIL PROTECTED]>, on 09/19/2006
:>   at 10:34 AM, Binyamin Dissen <[EMAIL PROTECTED]> said:

:>>The issue is that AC=1 programs expect to be called as job-step
:>>programs and may not completely clean up after themselves (expecting
:>>the initiator to do it).

:>Not the ones that I've seen. The standard used to be that all IBM
:>utilities were written to run as subroutines and they typically
:>allowed additional parameters when called as subroutines, e.g., ddname
:>lists. If anything, there are more eyeballs on the behavior of the
:>authorized programs.

:>I see it as a management issue; TSO limits the user to the authorized
:>programs that the installation wants available to him. That has to do
:>with the purposes of the programs, not just how housebroken they are.

There is no SAF call to see if the particular user can invoke the particular
program in authorized mode.

The list is the same for every user.

Thus I fail to see your conclusion.

--
Binyamin Dissen <[EMAIL PROTECTED]>
http://www.dissensoftware.com

Director, Dissen Software, Bar & Grill - Israel


Should you use the mailblocks package and expect a response from me,
you should preauthorize the dissensoftware.com domain.

I very rarely bother responding to challenge/response systems,
especially those from irresponsible companies.

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to