OTOH, completely outside the box, you could write a CMS that would allow one of the authorized users, from their ID to contact (maybe SMSG) a server that has access to the USER DIRECT, check that the target userid is not already logged on, change one of the LOGONBY IDs in the USER DIRECT to their userid, run DIRECTXA, then CP MSG them to go ahead with LOGONBY.
It could be made more complex (change MAINT 2CC MDISK to RR, have the server dynamically LINK/DET the MAINT 2CC as needed, etc.), but that's a start. Much more cumbersome, and less sophisticated than a ISV's ESM, but much less expensive, too. Mike Walter Hewitt Associates ----- Original Message ----- From: "Alan Altmark" [EMAIL PROTECTED] Sent: 11/24/2008 09:53 PM EST To: [email protected] Subject: Re: LOGONBY - limit of 8 userids. On Monday, 11/24/2008 at 08:01 EST, David Kreuter <[EMAIL PROTECTED]> wrote: > The LOGONBY statement in the directory is limited to 8 users. I have a client > that wants to have, say, 16 in the list. > The system is fairly knuckle scraping, i.e., no RACF, DIRMAINT, products, > etc. This isn't helping, as if DIRMAINT was there we could do a dynamic > directory update. > > I have thought of a command exit, or even a class C or E service machine that > zaps storage. But I'm too old for zapping storage ... > ... at least in production systems. > > Any ideas? The limit's not in CP code, but in the object directory. That's something that isn't changed trivially, requiring you to recompile any part of the system that references the directory. Good news: I think the code that abends the system doesn't reference the directory. That's, like, two modules you don't have to compile! :-) You'll have to drop back to your client's security policy for guidance. Security is not free, so if they MUST have LOGON BY with more than 8 byusers, then they MUST purchase an ESM. Of course, you could write an ESM for them, but that will cost them a boatload of money and take a while to complete, not to mention the ongoing cost of your support. Alan Altmark z/VM Development IBM Endicott The information contained in this e-mail and any accompanying documents may contain information that is confidential or otherwise protected from disclosure. If you are not the intended recipient of this message, or if this message has been addressed to you in error, please immediately alert the sender by reply e-mail and then delete this message, including any attachments. Any dissemination, distribution or other use of the contents of this message by anyone other than the intended recipient is strictly prohibited. All messages sent to and from this e-mail address may be monitored as permitted by applicable law and regulations to ensure compliance with our internal policies and to protect our business. E-mails are not secure and cannot be guaranteed to be error free as they can be intercepted, amended, lost or destroyed, or contain viruses. You are deemed to have accepted these risks if you communicate with us by e-mail.
