[Default] On 27 Jul 2018 17:41:11 -0700, in bit.listserv.ibm-main [email protected] (Rob Schramm) wrote:
>I am not sure.. They out those extended checks with smf 82's.. and put some >use parameters in the asymuse. > >I don't like bypassing security calls.. it's just a slippery slope to >bypassing all of it. Why should OPEN security checking be bypassed for VSAM and no other access method in key 0 / supervisor state. Clark Morris > >Rob Schramm > >On Fri, Jul 27, 2018, 7:40 PM Walt Farrell <[email protected]> wrote: > >> On Fri, 27 Jul 2018 16:19:31 -0400, Rob Schramm <[email protected]> >> wrote: >> >> >You would think that.. but what about the pervasive encryption? Wouldn't >> >ICSF with CHECKAUTH makes sure the key 0 user was authorized for the crypt >> >key and possibly checked for use for the data set? >> >> No, I would not expect ICSF to be involved with the data set checks at >> all. With the encryption you need to have access to the crypto data, and to >> the data set, but nothing says that ICSF is involved with checking both. >> Access to the data set can be granted by any of the usual mechanisms, as >> far as I know. >> >> -- >> Walt >> >> ---------------------------------------------------------------------- >> For IBM-MAIN subscribe / signoff / archive access instructions, >> send email to [email protected] with the message: INFO IBM-MAIN >> ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [email protected] with the message: INFO IBM-MAIN
