If that is the rule, then we don't need SECUSER or FOR, or when would you
use them?? Just courious.

On Wed, Apr 20, 2011 at 1:40 PM, Rob van der Heij <rvdh...@gmail.com> wrote:

> On Wed, Apr 20, 2011 at 10:13 PM, Martin, Terry R. (CMS/CTR) (CTR)
> <terry.mar...@cms.hhs.gov> wrote:
>
> > HCPFOR070E – Basically it is an authorization issue with the FOR command.
> We
> > are running RACF here so do you know what the profile would be and what
> RACF
> > class would need to be activated to define and permit this resource?  Can
> I
> > also do this via the SECUSER command?
>
> The SECUSER can issue these
> #CP SEND CP LINUX007 DET 191
> #CP SEND CP LINUX007 LINK * 191 191 MR
>
> But in general I consider it abuse of power to use a privileged userid
> (with FOR authorisation or as SECUSER) when the user could have done
> it himself. You could also do it from Linux (use "modprobe vmcp" if
> that does not happen at boot time already)
> vmcp "det 191"
> vmcp "link * 191 191 mr"
>
> Rob
>

Reply via email to