Ed Goodman wrote:May I ask why you need to hide the REXX code? Does it contain sensitive information, like maybe a list of passwords or something? Maybe a pending layoff list? Or are you just trying to hide working code so that no one steals it and uses it in their project?
As you can see from the responses here, this type of activity is distasteful to most people.
You got it right. Actually I don't want to hide Rex, I want to hide JCL. But I thought if I hide the REX itself, even that can be good.
The JCL has got around 15 steps using SORT, IBPTCH, IBUPDATE,TELON, COBOL etc. It will reduce quite a manual effort for all users in a group. But the JCL has got some credential ID's(self) and pass to access data that is other wise not possible for all. So, I cannot let anyone access one.
My organization doesn't approved the idea of password protected, as it doesn't make sense to Business.
So, I was looking for an alternative soln. if possible.