O'Reilly logo

IBM z/OS Mainframe Security and Audit Management Using the IBM Security zSecure Suite by Lili Xie, Jamie Pease, Deborah McLemore, Mark S. Hahn, Monique Conway, Michael Cairns, Axel Buecker

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

User roles for IBM Security zSecure Visual
This appendix contains RACF commands that you can use to create appropriate user roles, as documented in Chapter 3, “Configuring client authorities”, in the IBM Tivoli zSecure Visual Server Manual Version 1.11, SC23-6549.
These commands are not intended to be executed as provided, and serve merely as a guideline and quick start to getting your users set up in zSecure Visual. Modify these commands to suit your installation standards and intended use of the product.
RACF commands to generate zSecure Visual ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required