The main problem is security.  How do you keep someone from doing things you
really didn't intend them to do?  Auditors get kind of upset with utilities
that don't have built-in security, and tend to become happy when you point
out a interface to the security system, (that you are actually using).  It's
fairly easy to circumvent static Userids in the programs, and much more
difficult to fool RACF or ACF/2, (though not entirely impossible, but
auditors don't think that way:) ).  

You're right though, if all you want to do is stream a bunch of commands
with no logic to drive them, then there are lots of ways to accomplish that.

Brian

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to