On Wed, 4 Aug 2010 21:11:40 -0400, Shmuel Metz (Seymour J.) wrote: >In <listserv%201007271150351024.0...@bama.ua.edu>, on 07/27/2010 > at 11:50 AM, Paul Gilmartin said: > >>Thinking of it, ISPF is probably bad advice. You'd need to be >>running under ISPF, which means you'd need to be running under TSO, >>which means you'd need to be running APF authorized. > >Really? Why do you believe that your program has to be authorized to >run under the TMP? > IIRC, the OP stated somewhere that running his entire program under the TMP was an unattractive option, as is authorizing his entire program. The relation is inverted -- I don't believe there's any way for an unauthorized program not running under the TMP can invoke ISPF services.
-- gil ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html