On Wed, 25 Jul 2007 14:17:55 -0500, Anthony Saul Babonas 
<[EMAIL PROTECTED]> wrote:

>ummm, so what if someone copies it into their own clist lib, modifies the id
>check code, then runs it?
>
>Been there......had to be there actually.  we had an oldie where the
>original developer went off to other pursuits.  my id was not
>authorized......45 seconds later it was.
>
>locks are meant to keep honest people out.
>

I was thinking more along the lines of checking to validate certain bits turned 
on within a userid's defs, like whether the user has OPER, etc. authority?
Or maybe better yet in a REXX Exec instead of a CLIST.  Then, if a user got
hold of the code, their userid would need those security bits turned on to run 
it, and they are only available thru the Security folks, right?!

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to