I love following these discussions, though I don't use this stuff at all in my line of work.
I have a list of all the subpools (tacked to my wall, of course), but where do I find the documentation that explains these keys and what they do? Kind regards, Lindy -----Original Message----- From: IBM Mainframe Discussion List [mailto:[email protected]] On Behalf Of Peter Relson Sent: Wednesday, November 09, 2011 2:25 PM To: [email protected] Subject: Re: How to enable Storage Protection Override? >UserKey 9 can write into CICSKey 8? that cannot be correct as all DFH >modules would be up for overwriting. Where would integrity be? FWIW, "system integrity" is not a factor since in the CICS case the key 9 user has permission to get into key 8 and do whatever a key 8 user can do. Reliability is the reason for this function. Peter Relson z/OS Core Technology Design ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [email protected] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html

