You would think that.. but what about the pervasive encryption? Wouldn't ICSF with CHECKAUTH makes sure the key 0 user was authorized for the crypt key and possibly checked for use for the data set?
First time I ran with checkauth.. biggest user of ICSF was VTAM .. I think it was session keys. Rob Schramm On Fri, Jul 27, 2018 at 4:01 PM Walt Farrell <[email protected]> wrote: > On Thu, 26 Jul 2018 22:05:08 -0400, Rob Schramm <[email protected]> > wrote: > > >How does that interact with ICSF CHECKAUTH that forces security checks for > >authorized address spaces? > > There is no interaction, because you're mixing up different kinds of > checks. We've been talking about OPENing VSAM clusters, but you've just > asked about ICSF doing checks that are related to crypto requests, not > OPEN. Totally different beasts. > > -- > Walt > > ---------------------------------------------------------------------- > For IBM-MAIN subscribe / signoff / archive access instructions, > send email to [email protected] with the message: INFO IBM-MAIN > -- Rob Schramm ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [email protected] with the message: INFO IBM-MAIN
