<snip> If it is something that TSO already does, then why limit TSO to only run authorized programs on the AUTHPGM list? What is the harm of allowing any authorized programs as long as they don’t violate system integrity. </snip>
I don't know if doing so could result in a program that was not written to be run in an authorized environment to run in such an environment. It is rare that such cases do not have system integrity exposures. Peter Relson z/OS Core Technology Design ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN