Many thanks to all of you for the suggestions. I shall have to assess the various aspects and decide on how to continue. The only solution that is not acceptable is the "open" method.
Jon -----Ursprüngliche Nachricht----- Von: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] Im Auftrag von Tom Anderson Gesendet: Mittwoch, 15. Juni 2005 17:57 An: IBM-MAIN@BAMA.UA.EDU Betreff: Re: Calling authorised modules from non-authorised environments ( cross post from IBM-Main) Given all that has been said here, I would suggest that you approach it this way - 1. Determine what is your allowable/acceptable margin for error (i.e. Walt's points about possible program control, etc, etc). 2. How "intrusive" can the service be? Is it acceptable to "open" the dataset to check, etc. (By the way, Wayne pointed out that open was the "easiest" way to do what you want, not necessarily the least intrusive). 3. If you have decided to go/stick with doing "proxy checks" (for want of a better term), then build and test the core module that performs these checks and make sure it delivers the results you are seeking. The point here is to, for the time being at least, forget about the coms mechanism, until you have something that provides the required service. 4. Once you have a service that works, then decide on the communications mechanism. If you aren't comfortable with a user SVC or PC routine, perhaps some form of networking (sockets?) mechanism better suites your needs and comfort level. > > <snip> > > > Now my routine needs to be called from programs not running under > > TSO. The problem is that IKJEFTSR only runs within a TSO > > environment. <> Suggestions from the IBM Main list were to create a > > SVC or PC or use BPX1FRK/BPX1EXM. > > Those are your only legal choices. It is no accident that is is hard > to get control in an authorized condition. Maintaining integrity is > more important than making the facilities easy to use. Unfortunately, > the APF authorized AC(1) job step program is a blunt instrument and > all of the officially blessed mechanisms for call-level authorization > are complex to set up and designed to be relatively long lived, > amortizing their set up costs over many interactions. > > There is as yet no formal mechanism for transient requirements like > yours. One proposal evaluated by z/OS Design is to use the security > manager to augment authorization checks. In efffect, to provide > security mediated control over certain functions that currently > require APF or higher authorization. I don't know if that plan went > anywhere, but one of the designers will probably tell us. > > In any case since that option doesn't exist yet it won't do you any > good right now. Beyond that you should consider the objections raised > by Ed Jaffe and Walt Farrell. It is surprisingly difficult to know > specifically what SAF question to ask in order to get the right answer > in the context of your caller. If you are trying to decide whether or > not to allow access to a dataset, you may as well avoid the trouble > and just use recovery to cover up the S913 abend. > > CC > > ---------------------------------------------------------------------- > For IBM-MAIN subscribe / signoff / archive access instructions, send > email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO > Search the archives at http://bama.ua.edu/archives/ibm-main.html > ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- No virus found in this incoming message. Checked by AVG Anti-Virus. Version: 7.0.323 / Virus Database: 267.7.3/15 - Release Date: 14.06.2005 -- No virus found in this outgoing message. Checked by AVG Anti-Virus. Version: 7.0.323 / Virus Database: 267.7.3/15 - Release Date: 14.06.2005 ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html