The main problem is security. How do you keep someone from doing things you really didn't intend them to do? Auditors get kind of upset with utilities that don't have built-in security, and tend to become happy when you point out a interface to the security system, (that you are actually using). It's fairly easy to circumvent static Userids in the programs, and much more difficult to fool RACF or ACF/2, (though not entirely impossible, but auditors don't think that way:) ).
You're right though, if all you want to do is stream a bunch of commands with no logic to drive them, then there are lots of ways to accomplish that. Brian ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [email protected] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html

