If you like, you can use something like "expect" to script your dsmadmc commands. For applications that block regular STDIN piping and redirecting, like telnet or dsmadmc, "expect" does the magic tty swapping that's necessary to feed the password into the password prompt so it won't show in the ps. I don't know much more about it because it's a little higher powered programming than I've done in years, but if the security is that important to you, it might be worth your time. Here's the web site.
http://expect.nist.gov/ There's also a Perl version, but I don't know how good it's cross-platform functionality is. http://search.cpan.org/search?dist=Expect Good luck. Alex Paschal Storage Administrator Freightliner, LLC (503) 745-6850 phone/vmail -----Original Message----- From: Gerhard Rentschler [mailto:[EMAIL PROTECTED]] Sent: Thursday, February 14, 2002 2:00 AM To: [EMAIL PROTECTED] Subject: Re: How do you secure the passwd in a TSM admin command run a via batch script Hello, this would not solve all security problems. If a user does a "ps -elf" command on a unix system he can see the whole command line including the password. Best regards Gerhard ---- Gerhard Rentschler email: [EMAIL PROTECTED] Manager Central Servers & Services Regional Computing Center tel: ++49/711/6855806 University of Stuttgart fax: ++49/711/682357 Allmandring 30a D 70550 Stuttgart Germany Lindsey Thomson <[EMAIL PROTECTED]> Gesendet von: "ADSM: Dist Stor Manager" <[EMAIL PROTECTED]> 14.02.2002 05:57 Bitte antworten an "ADSM: Dist Stor Manager" An: [EMAIL PROTECTED] Kopie: Thema: Re: How do you secure the passwd in a TSM admin command run a via batch script Hi *, Saw this posted from: http://www.autovault.org/discus/index.html ########################### root owns the passwd file w/perms 600 or such: . PASSWORD='cat /home/root/adsmpw' "dsmadmc -id=USERID -pass=$PASSWORD "macro macroname" ########################### HTH lt 512 823 6522 (TL) 793