Endevor

 View Only
  • 1.  Endevor API Security catch-22 workaround

    Posted Nov 24, 2009 06:30 AM
    There are two ways to access the Endevor API:1) Your program resides in an authorized API library - in this instance the JCL executes the NDVRC1 program sending your API program as a parameter as noted below.   As this method allows all Endevor functions, it makes sense that only the Endevor admin can execute this.             //STEP1 EXEC PGM=NDVRC1,PARM='TESTAPI1,DATA1,DATA2 2) Your program is a non-authorized program and can therefore be in any library - in this instance the JCL executes  your API program directly  as noted below.   As this method only allows "display" access using the API, you would think that anyone could access this functionality that has read access to the Endevor libraries.   However, when the API is invoked, Endevor performs a verify on the MCF.   This requires CONTROL access be given to all who wish to execute the API.                //STEP1 EXEC PGM=myapipgm,PARM='TESTAPI1,DATA1,DATA2 I would like to use only the second method and allow developers access to the API.   However, I do not want to grant CONTOL access to all developers because this is a security risk.  Currently, after each compile during development, we need to request the Endevor admin execute the program.   Not optimal for development.    For adhoc development execution,  we either can request the Endevor admin execute the program or make it a production job and have scheduling execute it via zeke.  It would be nice if a developer could develop and execute a "list api" without having upgraded security access.  Does anyone have a workaround to this?   


  • 2.  Re: Endevor API Security catch-22 workaround
    Best Answer

    Posted Nov 24, 2009 07:05 AM
    All Endevor actions executed by the Endevor API should execute with the same security as the native Endevor action as defined by your site security tables and external security rules.  Try to setup your JCL as follows and let us know if this works for you:   //STEP1 EXEC PGM=NDVRC1,REGION=4M,
    // PARM='CONCALL,DDN:APILIB,myapipgm,TESTAPI1 DATA1 DATA2'
    //STEPLIB DD DISP=SHR,DSN=endevor.user.authlib
    // DD DISP=SHR,DSN=endevor.authlib
    //CONLIB DD DISP=SHR,DSN=endevor.conlib
    //APILIB DD DISP=SHR,DSN=your.api.loadlib
    //C1MSGS1 DD SYSOUT=*
    //C1MSGS2 DD SYSOUT=*
    //BSTERR DD SYSOUT=*   Best Regards,Kevin


  • 3.  Re: Endevor API Security catch-22 workaround

    Posted Nov 24, 2009 09:01 AM
    Thanks Kevin - your suggestion worked great!!!!!!