On 12/6/2006 11:03 AM, Randy Harris wrote:
I agree completely with your method of control. I see many cases on a
daily basis which should handled in that manner. But then, I have no control.
Anyway, restricting IEBUPDTE was just a thought and may not be feaseable
or effective as Sam mentioned. I will continue to restrict access the
proper way. Thank you all for your comments.

If you want to stop people from using IEBUPDTE (or any other program except those in LPA) then PROGRAM profiles in RACF should do it. Without seeing exactly how you set it up I can not comment on why that did not work for you.

However, as others have noted, restricting the program is often the wrong answer.

In this case, what problem are you trying to solve that makes restricting IEBUPDTE the answer? IEBUPDTE can only update data sets to which the user has update access, and if the user has update access there are many programs he could use to perform an update. So what makes IEBUPDTE special and worthy of control in this case? (That is, what makes use of IEBUPDTE problematic when use of other programs is OK?)

        Walt Farrell, CISSP
        z/OS Security Design, IBM

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to