On Wed, 4 Aug 2010 21:11:40 -0400, Shmuel Metz (Seymour J.) wrote:

>In <listserv%201007271150351024.0...@bama.ua.edu>, on 07/27/2010
>   at 11:50 AM, Paul Gilmartin said:
>
>>Thinking of it, ISPF is probably bad advice.  You'd need to be
>>running under ISPF, which means you'd need to be running under TSO,
>>which means you'd need to be running APF authorized.
>
>Really? Why do you believe that your program has to be authorized to
>run under the TMP?
>
IIRC, the OP stated somewhere that running his entire program under
the TMP was an unattractive option, as is authorizing his entire
program.  The relation is inverted -- I don't believe there's any
way for an unauthorized program not running under the TMP can
invoke ISPF services.

-- gil

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to