I am not sure.. They out those extended checks with smf 82's.. and put some use parameters in the asymuse.
I don't like bypassing security calls.. it's just a slippery slope to bypassing all of it. Rob Schramm On Fri, Jul 27, 2018, 7:40 PM Walt Farrell <[email protected]> wrote: > On Fri, 27 Jul 2018 16:19:31 -0400, Rob Schramm <[email protected]> > wrote: > > >You would think that.. but what about the pervasive encryption? Wouldn't > >ICSF with CHECKAUTH makes sure the key 0 user was authorized for the crypt > >key and possibly checked for use for the data set? > > No, I would not expect ICSF to be involved with the data set checks at > all. With the encryption you need to have access to the crypto data, and to > the data set, but nothing says that ICSF is involved with checking both. > Access to the data set can be granted by any of the usual mechanisms, as > far as I know. > > -- > Walt > > ---------------------------------------------------------------------- > For IBM-MAIN subscribe / signoff / archive access instructions, > send email to [email protected] with the message: INFO IBM-MAIN > -- Rob Schramm ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [email protected] with the message: INFO IBM-MAIN
