Previous Topic: Security ConsiderationsNext Topic: Issuing Commands to Other Applications


VTAM APPLIDs

The APPLIDs used by the EPI itself can be used to fake access to other applications, unless the APPLIDs themselves are protected. This means protecting the VTAM list libraries with RACF or CA ACF2 and using the PRTCT operand on all EPI application definitions.