[Default] On 27 Jul 2018 17:41:11 -0700, in bit.listserv.ibm-main
[email protected] (Rob Schramm) wrote:

>I am not sure.. They out those extended checks with smf 82's.. and put some
>use parameters in the asymuse.
>
>I don't like bypassing security calls.. it's just a slippery slope to
>bypassing all of it.

Why should OPEN security checking be bypassed for VSAM and no other
access method in key 0 / supervisor state.

Clark Morris
>
>Rob Schramm
>
>On Fri, Jul 27, 2018, 7:40 PM Walt Farrell <[email protected]> wrote:
>
>> On Fri, 27 Jul 2018 16:19:31 -0400, Rob Schramm <[email protected]>
>> wrote:
>>
>> >You would think that.. but what about the pervasive encryption?  Wouldn't
>> >ICSF with CHECKAUTH makes sure the key 0 user was authorized for the crypt
>> >key and possibly checked for use for the data set?
>>
>> No, I would not expect ICSF to be involved with the data set checks at
>> all. With the encryption you need to have access to the crypto data, and to
>> the data set, but nothing says that ICSF is involved with checking both.
>> Access to the data set can be granted by any of the usual mechanisms, as
>> far as I know.
>>
>> --
>> Walt
>>
>> ----------------------------------------------------------------------
>> For IBM-MAIN subscribe / signoff / archive access instructions,
>> send email to [email protected] with the message: INFO IBM-MAIN
>>

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to