|
- What is RACF? - IBM
Resource Access Control Facility or RACF provides the tools to manage user access to critical resources RACF is an add-on software product that provides basic security for a mainframe system (examples of other security software packages include ACF2 and Top Secret, both from Computer Associates)
- IBM Resource Access Control Facility (RACF)
Protect your mainframe resources with tools that manage and control access to valuable z OS data with IBM Resource Access Control Facility
- z OS: z OS Security Server RACF Security Administrators Guide - IBM
How RACF meets security needs 1 User identification and verification 1 Authorization checking
- z OS Security Server RACF General Users Guide - IBM
RACF commands enable you to find out how you are defined to RACF, how to protect your resources, how to change another user's access to your resources, and how to change the way RACF defines you
- RACF classes and profiles for resources - IBM
RACF classes and resource profiles are the means of defining resources that need to be protected Users or groups of users can then be assigned the access that they need to those resources
- How users and groups are authorized to access resources - IBM
When a user requests access to a resource that has a security classification, RACF compares the security classification of the user with the security classification of the resource For more information on security classifications, see Classifying users and data
- Managing security with the RACF access control module
The RACF access control module allows you to use RACF in addition to Db2 authorization checking for Db2 objects, authorities, commands, and utilities
- SETROPTS (Set RACF options) - IBM
If the SETROPTS command is issued as a RACF operator command, the command and the password data is written to the system log Therefore, use of SETROPTS as a RACF operator command should either be controlled or you should issue the command as a TSO command
|
|
|