- 6 hours
The Defining Users to RACF course details the skills that are required by a security administrator, programmer, or DBA in using RACF to secure systems and data. It explains how to define and maintain individual users and groups system security access.
Application programmers, systems programmers, database administrators, security administrators and anyone requiring knowledge about the use of the Security Server (RACF) on the z/OS platform.
Know how to use TSO and ISPF and have an understanding of data sets and basic security issues.
After completing this course the student should be able to:
- Describe how RACF protects a z/OS environment
- Describe how RACF uses profiles to define and control access to resources.
- Identify and use RACF commands through TSO
- Identify describe the use of the RACF batch and programming interfaces
- Describe the use and structure of group profiles
- Identify and use the commands available to maintain group profiles
- Maintain group profiles through the RACF ISPF Interface
- Describe a user profile and its structure
- List the commands used to define and maintain user profiles
- Use the CONNECT and REMOVE RACF commands
- Describe the effect of Group and Class Authorities on user administration privileges
- Use Attributes and Authorities to delegate RACF administration responsibilities
Introduction to RACF
The ISPF Interface
Batch and Programming Interfaces
Group Profile Commands
Using the ISPF Interface to Maintain Group Profiles
User Profile Record Structure
User Profile Commands
Using the ISPF Interface to Maintain User Profiles
Connecting User and Group Profiles