Doesn't IBM itself do such checks in order to determine which path to take in some routines?
-- Shmuel (Seymour J.) Metz http://mason.gmu.edu/~smetz3 ________________________________________ From: IBM Mainframe Discussion List [IBM-MAIN@LISTSERV.UA.EDU] on behalf of Peter Relson [rel...@us.ibm.com] Sent: Monday, June 15, 2020 8:21 AM To: IBM-MAIN@LISTSERV.UA.EDU Subject: Re: HOW DO I VERIFY A USERID'S ACCESS TO A DATASET <snip> A security jock should treat an access query with a negative reply as a violation as serious as attempting the access and failing. </snip> All should agree. That's one of the reason that customers can request logging of such requests. Peter Relson z/OS Core Technology Design ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN