I am not sure.. They out those extended checks with smf 82's.. and put some
use parameters in the asymuse.

I don't like bypassing security calls.. it's just a slippery slope to
bypassing all of it.

Rob Schramm

On Fri, Jul 27, 2018, 7:40 PM Walt Farrell <[email protected]> wrote:

> On Fri, 27 Jul 2018 16:19:31 -0400, Rob Schramm <[email protected]>
> wrote:
>
> >You would think that.. but what about the pervasive encryption?  Wouldn't
> >ICSF with CHECKAUTH makes sure the key 0 user was authorized for the crypt
> >key and possibly checked for use for the data set?
>
> No, I would not expect ICSF to be involved with the data set checks at
> all. With the encryption you need to have access to the crypto data, and to
> the data set, but nothing says that ICSF is involved with checking both.
> Access to the data set can be granted by any of the usual mechanisms, as
> far as I know.
>
> --
> Walt
>
> ----------------------------------------------------------------------
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to [email protected] with the message: INFO IBM-MAIN
>
-- 

Rob Schramm

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to