Program pathing
Some security packages offer the option of access to certain files only through restricted lists of programs, and sometimes only if the program names come from a particular library or calling path. The following paragraphs describes the program structure in Data Set Commander so that you can inform your security package appropriately.
If a user is invoking standard ISPF, the task structure is unchanged. If Data Set Commander is active, ISPF, ISPSTART, and PDF are aliases of Data Set Commander that are attached by the TMP. Internally, they reattach Data Set Commander. Data Set Commander then attaches ISRPCP (an entry point to ISPF itself). The following diagram illustrates this relationship:
ISRPCP (an alias of the IBM-supplied ISPF) starts ISPF normally, and then links to module IQIITH, which in turn displays the main panel or invokes the program or CLIST entered on the ISPF/PDF/ISPSTART command line.
When the user selects option 1 (BROWSE), 2 (EDIT), or 6 (TSO), Data Set Commander uses its own versions of ISRBRO, ISREDIT, and ISRPTC as follows:
User option | Original IFPF Module | DSC replacement |
---|---|---|
1 (BROWSE) | ISRBRO | IQIMSL |
2 (EDIT) | ISREDIT | IQIMSL |
6 (TSO) | ISRPTC | IQITSO |