<snip> How is using a field for what it is intended for abuse? </snip> "Abuse" in this case is creating a subsystem when there is no need to do so. In the past, subsystems were sometimes created solely to have access to the SSCTUSER field.
<snip> And how is N/T easier? </snip> For the same reason as above -- there is no need to create a subsystem. It is likely easier, also, for the application to retrieve the data. Peter Relson z/OS Core Technology Design ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN