On Tue, 1 Sep 2015 06:51:43 -0500, Walt Farrell wrote: > >I believe it is true that ISGENQ restricts authorized callers to using only >authorized QNAMEs, gil. Use of unauthorized QNAMES by authorized callers can >easily end up being a system integrity issue, ... > I can imagine a DoS attack in which an unauthorized user bogarts a QNAME/RNAME generally used by an authorized facility. But such contention could arise entirely among unauthorized users. Are there, perhaps, RACF rules to restrict use of selected QNAMEs to specified user profiles?
-- gil ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN