On Fri, 27 Jul 2018 16:19:31 -0400, Rob Schramm <[email protected]> wrote:

>You would think that.. but what about the pervasive encryption?  Wouldn't
>ICSF with CHECKAUTH makes sure the key 0 user was authorized for the crypt
>key and possibly checked for use for the data set?

No, I would not expect ICSF to be involved with the data set checks at all. 
With the encryption you need to have access to the crypto data, and to the data 
set, but nothing says that ICSF is involved with checking both. Access to the 
data set can be granted by any of the usual mechanisms, as far as I know.

-- 
Walt

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to