I would say your first action should be to determine whether there are
alternative RACF functions (or functions that invoke RACF functions) that do
not require authorization. If so, try to use them instead.

Thus, to start, perhaps you should describe the RACF functions you're using
and need in greater detail. If you can replace them with something else,
that will prove much simpler and safer in the long run, I think

Also, it would help to know more about how your program runs (STC, or
invoked by a user as a batch job or TSO command or whatever) and why there
are STEPLIBs involved.

-- 
Walt Farrell
IBM STSM, z/OS Security Design

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to