Chapter 7. Mainframes in the Enterprise-Wide Security Infrastructure
Until now, we have discussed how to interact with a z/OS system and how to administer users, set permissions, and collect and view audit reports on a z/OS system. In this chapter, we look beyond the z/OS system to understand how security capabilities on z/OS work in combination with security capabilities on other systems and security components in a heterogeneous computing environment.
This chapter reviews the concept of an enterprise and what comprises an enterprise. It introduces security functions that span an enterprise (end-to-end security). It also reviews several commonly used communications protocols and how they are used to communicate with applications running on z/OS ...
Get Mainframe Basics for Security Professionals: Getting Started with RACF now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.