I would say your first action should be to determine whether there are alternative RACF functions (or functions that invoke RACF functions) that do not require authorization. If so, try to use them instead.
Thus, to start, perhaps you should describe the RACF functions you're using and need in greater detail. If you can replace them with something else, that will prove much simpler and safer in the long run, I think Also, it would help to know more about how your program runs (STC, or invoked by a user as a batch job or TSO command or whatever) and why there are STEPLIBs involved. -- Walt Farrell IBM STSM, z/OS Security Design ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [email protected] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html

