George Fogg wrote:
Well, not quite true Ed. However, I do agree with you that ...
Also, I didn't mentioned the fact that ...
Here's how MCS/SMCS console command authority works ...

[Lots of text snipped]

George, What I was trying to say was just this simple: Assume all user-accessible EMCS consoles are protected by logon, ensure all SMCS consoles are defined with LOGON(REQUIRED), and deny access to MVS.VARYLOGON.CN. Then, the only consoles capable of changing the LOGON requirement for other consoles will be standard MCS consoles that are not logged on -- which, if any exist, are (or ought to be) located in a secure area.

--
Edward E Jaffe
Phoenix Software International, Inc
5200 W Century Blvd, Suite 800
Los Angeles, CA 90045
310-338-0400 x318
[EMAIL PROTECTED]
http://www.phoenixsoftware.com/

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to