> -----Original Message-----
> From: IBM Mainframe Discussion List On Behalf Of Shmuel Metz (Seymour
J.)
> 
> In <[EMAIL PROTECTED]>, on 02/23/2008
>    at 10:07 AM, Walt Farrell said:
> 
> >One could argue that letting you determine your access to resources 
> >without actually trying to use them (and thus without causing audit
> >records) is a form of hacking.
> 
> Perhaps, but some IBM code does exactly that, and for what 
> seems to be good cause. I don't recall the details, but it 
> was discussed here in the last few years.

CICS offers the EXEC CICS QUERY SECURITY command as a supported API.....

    -jc-

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to