------------------------------------<snip>-------------------------------
What are the principal offenders? From an applications viewpoint, I see (the facilities provided by) IEBCOPY, IDCAMS, TRANSMIT/RECEIVE. (Others?) I find it bizarre that in a non-APF authorized state I can't manipulate data or rename data sets for which I have all otherwise necessary RACF authority.

What relief would be possible?
------------------------------------<unsnip>--------------------------------
APF authorization is intended not only to protect the user from himself, but also to maintain system integrity. Invoking the wrong service at the wrong time could be a major disaster for the entire data center. Bear in mind that APF authorization also allows a programmer to bypass many of the checks that help maintain integrity, as well as RACF security (or ACF2 or Top Secret). You can't expect security to be able to distinguish a System dataset from a User dataset by keeping a table of DSNAMEs, since we have the option of renaming so many critical system datasets during installation. So between APF and RACF (et. al.), the system keeps a fairly tight rein on who does what.

--------------------------------------<snip>--------------------------------------
o Could IEBCOPY be enhanced to operate without APF authorization? What performance degradation would this involve?
-------------------------------------<unsnip>------------------------------------
IIRC, IEBCOPY uses a couple of fairly sophisticated I/O Appendages in achieving its stellar performance. These are NOT for the average programmer.

-------------------------------------<snip>----------------------------------
o BPX1EXM appeared tantalizing when it first appeared. But it suffers the defect of not supporting useful DDNAME allocation. Would an APF-authorized wrapper invoked via BPX1EXM, allocating data sets specified by the TSOALLOC environment variable as used by the US^H^H OMVS command, then calling a target authorized utility be secure and useful?
--------------------------------------<unsnip>----------------------------------
I would question the need.

------------------------------------<snip>------------------------------------
o The new-fangled (z/OS 1.4) Unix Rexx "address TSO" subcommand environment is a great help in some cases: it runs the TMP in a separate, presumably secure, address space. Alas, it's available only when Rexx is spawned from a shell. Would it be possible to access this environment with a suitable API call to the Rexx interpreter?
-------------------------------------<unsnip>---------------------------------
Here again, I would question the need.

I can't make any form of "detailed" comments on the last two points, due to my complete lack of experience in these areas. But if a bona-fide business were presented to IBM, with enough positive response, there MIGHT be adjustments made or mechanisms developed.

Rick

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to