Walt Farrell wrote: >The key point is that the DFDSS enforces security, and the ADMINISTRATOR >keyword usage must be controlled, because it's purpose is to bypass certain >other security checks.
I certainly know it. I just took this example to illustrate my point. I could use other examples if I wish. >There is no security processing in DFSORT, and therefore there is no reason to >protect any of its processing. Anyone who can read a file can always produce a >modified copy of it, whether that's by using DFSORT, IEBGENER, a homegrown >COBOL application, or even a simpe REXX exec or CLIST. Agreed. As long you can convince the auditors you can reproduce the reports 100% faithfully from original data source. Groete / Greetings Elardus Engelbrecht ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [email protected] with the message: INFO IBM-MAIN
