CA 1 Passwords and Security › IBM RACF Security Setup
IBM RACF Security Setup
The following steps are required for implementation of the CA 1 external security system in an IBM RACF environment. (Each step is discussed in detail in the subsequent paragraphs.)
- Assemble the Class Descriptor table.
- Assemble the RACF Router table.
- Define CA 1 resources to RACF.
- Assign authority for CA 1 users.
- Activate the CA 1 classes.
- Update the RACF Started Procedures table.
- If the class names of CA@MD or CA@APE need to be changed, assemble the CAISSF module CAS9SAFC.