O'Reilly logo

Mainframe Basics for Security Professionals: Getting Started with RACF by Tim Hahn, Mark Nelson, Barbara Vander Weele, Ori Pomerantz

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 3. Protecting Data Sets and Other Resources

A production z/OS system using a mainframe can contain a wide variety of resources: data sets, UNIX file system files, databases, transactions, and so on. Information security is necessary to preserve the confidentiality, integrity, and availability of those resources. In this chapter, you learn how to configure profiles in RACF. Profiles specify the authorization level of users to determine who is authorized to read and modify resources such as those noted.

Most UNIX systems give all users similar permissions. Users who use just a specific application, such as the web server, are stored in a different user registry. Very often a single computer hosts only one application. On the other hand, a ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required