You would think that.. but what about the pervasive encryption?  Wouldn't
ICSF with CHECKAUTH makes sure the key 0 user was authorized for the crypt
key and possibly checked for use for the data set?

First time I ran with checkauth.. biggest user of ICSF was VTAM .. I think
it was session keys.

Rob Schramm

On Fri, Jul 27, 2018 at 4:01 PM Walt Farrell <[email protected]> wrote:

> On Thu, 26 Jul 2018 22:05:08 -0400, Rob Schramm <[email protected]>
> wrote:
>
> >How does that interact with ICSF CHECKAUTH that forces security checks for
> >authorized address spaces?
>
> There is no interaction, because you're mixing up different kinds of
> checks. We've been talking about OPENing VSAM clusters, but you've just
> asked about ICSF doing checks that are related to crypto requests, not
> OPEN. Totally different beasts.
>
> --
> Walt
>
> ----------------------------------------------------------------------
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to [email protected] with the message: INFO IBM-MAIN
>
-- 

Rob Schramm

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to