Chapter 3. Protecting Data Sets and Other Resources
A production z/OS system using a mainframe can contain a wide variety of resources: data sets, UNIX file system files, databases, transactions, and so on. Information security is necessary to preserve the confidentiality, integrity, and availability of those resources. In this chapter, you learn how to configure profiles in RACF. Profiles specify the authorization level of users to determine who is authorized to read and modify resources such as those noted.
Most UNIX systems give all users similar permissions. Users who use just a specific application, such as the web server, are stored in a different user registry. Very often a single computer hosts only one application. On the other hand, a ...
Get Mainframe Basics for Security Professionals: Getting Started with RACF now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.