On Tue, 1 Sep 2015 06:51:43 -0500, Walt Farrell wrote:
>
>I believe it is true that ISGENQ restricts authorized callers to using only 
>authorized QNAMEs, gil. Use of unauthorized QNAMES by authorized callers can 
>easily end up being a system integrity issue, ...
>
I can imagine a DoS attack in which an unauthorized user bogarts a QNAME/RNAME
generally used by an authorized facility.  But such contention could arise 
entirely
among unauthorized users.  Are there, perhaps, RACF rules to restrict use of
selected QNAMEs to specified user profiles?

-- gil

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to