> I run a zPDT and on there is a utility (i.e. a Linux command ACPTOOL) to > allow the changing of some Control Points without a TKE.....
As has been stated multiple times in the zPDT documentation (RedBooks and BlueBook) and on the zPDT forum: zPDT is not intended as a secure system for many reasons. There are no plans to change this on an emulated system!! There is an intent to have most of the ICSF commands/macros (and actual hardware instructions) "work" to provide program development and testing, but that is a different intent than providing a "real" secure system. (And one specific recommendation has been repeated: DO NOT USE THE SAME MASTER KEYS ON zPDT THAT ARE USED ON A REAL SYSTEM.) It seems to me (being old and a little stupid) that there are several levels to this discussion: 1. Those having almost no interest in security much beyond simple userids and some basic dataset protections. Many zPDT users, or perhaps real system/LPAR users who are sufficiently isolated by other means are in this group. This might include a potentially larger group of "newcomers" to mainframes!! 2. Those who would like to go through the motions (without digging too far into the details) to implement some basic security, mostly to protect against "accidental" errors/problems/trials/experimentation/etc. This level would probably involve some routine basic/simple maintenance such as normal RACF commands, etc, etc, etc. 3. Those who really need much fuller security and are willing to dig into many details. These might be installations that process $$billions$$ daily, etc, etc, etc, and need to immediately consider quantum-safe details, etc, etc. Or those who are developing software products to work in this environment. 4. Those dealing with other security natures (such as national Top Secret, etc, etc) and need to incorporate their systems into the appropriate level/compartment/etc. (The IBM-MAIN discussions do not generally involve such systems, so I will ignore them here!) In the good-old-days, when I was a little younger, there were often smaller RedBooks that dealt with practical usage of various areas of IBM systems. In a sense, this material was mostly written by actual users (customers, IBMers) of the products being addressed and often touched multiple IBM products/commands/components that were involved in practical operations. These were sometimes seen as "hands on" books. (Of course, since today few companies provide real "paper" books, there are additional considerations .....) My $.02 worth, if it is worth that much! Bill Ogden ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN