On Mon, Jun 25, 2018 at 8:44 AM Peter Relson <[email protected]> wrote:

> Only if the attacher is authorized and asks for that to be done, by
> setting bit TCBSENVP (the "P" stands for "propagate") in its own TCB prior
> to the ATTACH(X).
> If the bit is on, the bit and the value are propagated to the daughter
> TCB.
>

​Thank very much. That satisfies my curiosity completely​.

Not that I would ever designed a MUSAS application in today's z/OS
environment. Possibly due to an extreme *IX infection, I'd use z/OS UNIX
services to either fork()/exec() or spawn() a new address space, using the
UNIX facilities (using the proper RACF permissions) to start a new address
space for the new user. Much like the z/OS ftp server does. Isolating the
users in separate address spaces is much much expensive, but it
significantly more secure. However, that is just my opinion.



>
> Peter Relson
> z/OS Core Technology Design
>
>

-- 
There is no such thing as the Cloud. It is just somebody else’s computer.

Maranatha! <><
John McKown

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to