Robert, here is my code:-
Report_TSO_Logon_Parameters:Procedure Expose gda_parm. ,
gda_parm_cnt
Address TSO
On 2023-01-19 14:45, Walt Farrell wrote:
On Thu, 19 Jan 2023 15:02:06 +, Robert Prins
wrote:
And then you realise that the question should have been, "How do I get at
it (control-block chasing-wise) in REXX?".
At what time in the user's logon, and where is the REXX exec running?
The
On Thu, 19 Jan 2023 15:02:06 +, Robert Prins
wrote:
>And then you realise that the question should have been, "How do I get at
>it (control-block chasing-wise) in REXX?".
>
At what time in the user's logon, and where is the REXX exec running?
And why are you trying to do this from REXX? Wh
AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Contents of "Command" field on standard login screen - where to find it
WARNING - One or more website links in this email have been determined to be
malicious. Those malicious website links will be blocked from user access.
Userid===&
And then you realise that the question should have been, "How do I get at
it (control-block chasing-wise) in REXX?".
Apologies
Robert
On Thu, 19 Jan 2023 at 12:14, John McKown
wrote:
> If you mean "where is this field stored", is is in the TSO segment in RACF.
> I don't know about other ESMs.
If you mean "where is this field stored", is is in the TSO segment in RACF.
I don't know about other ESMs.
On Thu, Jan 19, 2023, 06:09 Robert Prins wrote:
> Userid===>
>
> Password ===>
>
> Procedure ===>
>
> Acct Nmbr ===>
>
> Size ===> 1048576
>
> Perform ===>
>
> Command ===> ex
Userid===>
Password ===>
Procedure ===>
Acct Nmbr ===>
Size ===> 1048576
Perform ===>
Command ===> ex 'prino.rahp.exec(prino)' <=== ***This one***
I used to know, and used it on the now defunct FanDeZhi system to allow
advanced users break out of the standard logon exec, but