On Tuesday, 06/01/2010 at 11:42 EDT, David Boyes <dbo...@sinenomine.net> 
wrote:
> Depends on the auditor. For some, it will. For others, it won't. YMMV.

Natch.  One must always challenge a flawed finding.  Likewise, one must 
accept the valid ones.  Wisdom is knowing the difference.  [With apologies 
to Dr. Niebuhr.]

> > I say "somewhat" since I think that the 3270 datastream is ripe for 
the
> > host to be able send an "enable/disable/query screen lock" to the
> > emulator, independent of any OS-level locks, and potentially
> > appropriate
> > to the specific application.  (Some apps access more sensitive data
> > than
> > others.)
> 
> I don't remember -- is the state of the key lock reported? If so, you 
could 
> probably overload the screen lock state onto that 3270 state without 
having to 
> reengineer stuff.

No, key lock is not reported, being a completely local phenomenon.  I was 
thinking along the lines of the host causing the emulator to enable the 
workstation's (or its own) lock program just by sending a special order or 
structured field.  When the user types a password, the data flows back to 
the host for validation.  Kind of like an http challenge.

Of course, VM's ability to disconnect the session from the virtual machine 
accomplishes the same thing, but it's rather heavy handed.

Alan Altmark
z/VM Development
IBM Endicott

Reply via email to