My $0.02:
I always use MVS.MSCOPER.&RACUID*/READ in the GAT.
Many years ago I've found some presentation where it was explained the console name is no longer relevant for security. Note, the above does not mean *any name*, it is JOHN1, or JOHNABC name (assuming JOHN is the userid). What risk?

IMHO the CONSOLE class nowadays is rarely useful, except "WHEN(CONSOLE(SDSF))" in OPERCMDS profiles.

--
Radoslaw Skorupka
Lodz, Poland



W dniu 03.07.2025 o 09:26, Colin Paice pisze:
Jon,

My question was about the use of console-names, and giving end users access
to them.
Is there a better way of controlling which console-names can be used, that
the MVS.MSCOPER.&RACUID*/READ  profile?

Colin

On Wed, 2 Jul 2025 at 23:29, Jon Perryman <[email protected]> wrote:

On Wed, 2 Jul 2025 13:41:54 +0100, Colin Paice <[email protected]>
wrote:

COLINX   00000290  CANCEL AAAA
TSU03273 00000090  IEE341I AAAA              NOT ACTIVE
There is no * on the front of my console-name
An * (asterisk) in the first byte of syslog lines (in this case before
console name) should identify a WTOR. Is this referring to something else?

I like your profile MVS.MSCOPER.&RACUID*/READ   I haven't used that before
... I'll add it to my list of useful commands.
To me, this is a very bad idea. You've opened the first permission in
multi-permission system command protection. Maybe there is a typo in a
subsequent profile. Maybe insufficient testing. New commands weren't
considered in the security design. Is it really so difficult to create a
group with read access for something so powerful?

----------------------------------------------------------------------


----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to