Snip
I admit, I don't have practical experience with "HFS security under
ACF2", but I can't get rid of my bad feeling about this. If you're going
to be using z/OS UNIX, you should understand UNIX security and what UNIX
applications can do with 
it, and what they expect. 
I would not use anything else than permission bits and ACLs provided by
z/OS UNIX file systems. Just my $0.02 
End snip

I have at least a passing familiarity with UNIX 'security' and I feel
just the opposite. We use TOP SECRET HFSSEC and it is MUCH more robust
than UNIX security bits and allows for control by our centralized
security department. UNIX security bits can be changed by the user to
allow anyone access to their files whether that complies with corporate
policy or not. Centralizing security gives us the ability to enforce
policy and keep a better handle on file access.


Jon L. Veilleux 
[EMAIL PROTECTED] 
(860) 636-2683 

This e-mail may contain confidential or privileged information. If
you think you have received this e-mail in error, please advise the
sender by reply e-mail and then delete this e-mail immediately.
Thank you. Aetna   

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to