On Wed, 25 Jul 2007 14:17:55 -0500, Anthony Saul Babonas <[EMAIL PROTECTED]> wrote:
>ummm, so what if someone copies it into their own clist lib, modifies the id >check code, then runs it? > >Been there......had to be there actually. we had an oldie where the >original developer went off to other pursuits. my id was not >authorized......45 seconds later it was. > >locks are meant to keep honest people out. > I was thinking more along the lines of checking to validate certain bits turned on within a userid's defs, like whether the user has OPER, etc. authority? Or maybe better yet in a REXX Exec instead of a CLIST. Then, if a user got hold of the code, their userid would need those security bits turned on to run it, and they are only available thru the Security folks, right?! ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html

