On Mon, Jun 25, 2018 at 8:44 AM Peter Relson <[email protected]> wrote:
> Only if the attacher is authorized and asks for that to be done, by > setting bit TCBSENVP (the "P" stands for "propagate") in its own TCB prior > to the ATTACH(X). > If the bit is on, the bit and the value are propagated to the daughter > TCB. > Thank very much. That satisfies my curiosity completely. Not that I would ever designed a MUSAS application in today's z/OS environment. Possibly due to an extreme *IX infection, I'd use z/OS UNIX services to either fork()/exec() or spawn() a new address space, using the UNIX facilities (using the proper RACF permissions) to start a new address space for the new user. Much like the z/OS ftp server does. Isolating the users in separate address spaces is much much expensive, but it significantly more secure. However, that is just my opinion. > > Peter Relson > z/OS Core Technology Design > > -- There is no such thing as the Cloud. It is just somebody else’s computer. Maranatha! <>< John McKown ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [email protected] with the message: INFO IBM-MAIN
