Snip I admit, I don't have practical experience with "HFS security under ACF2", but I can't get rid of my bad feeling about this. If you're going to be using z/OS UNIX, you should understand UNIX security and what UNIX applications can do with it, and what they expect. I would not use anything else than permission bits and ACLs provided by z/OS UNIX file systems. Just my $0.02 End snip
I have at least a passing familiarity with UNIX 'security' and I feel just the opposite. We use TOP SECRET HFSSEC and it is MUCH more robust than UNIX security bits and allows for control by our centralized security department. UNIX security bits can be changed by the user to allow anyone access to their files whether that complies with corporate policy or not. Centralizing security gives us the ability to enforce policy and keep a better handle on file access. Jon L. Veilleux [EMAIL PROTECTED] (860) 636-2683 This e-mail may contain confidential or privileged information. If you think you have received this e-mail in error, please advise the sender by reply e-mail and then delete this e-mail immediately. Thank you. Aetna ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html

