On 3/5/2014 7:10 AM, dpewen wrote:
Hello,

I started this thread and I appreciate all the input I received from this list.
I have solved the problem by adding code to my user svc that is part of the 
product.
I added two functions to the svc:
1. to turn on the APF-auth bit in the job step TCB
2. to turn off the APF-auth bit in the job step TCB

Turning on JSCBAUTH makes _every TCB in the job step_ authorized! This is an exposure!

There should be another way to achieve what you want. But, at the very least you must understand that any time you're going to modify a job step or address space-level setting, especially one that confers additional privileges to otherwise non-privileged TCBs, you MUST ensure that all such TCBs are marked non-dispatchable for the duration of the enhanced setting. This is what TSO/E does during execution of a program on the Authorized Leg of the TMP.

--
Edward E Jaffe
Phoenix Software International, Inc
831 Parkview Drive North
El Segundo, CA 90245
http://www.phoenixsoftware.com/

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to