To protect your program libraries, you can use existing access control facilities or develop your own security validation module. This module would then be added to your key utilities such as IEBCOPY and the linkage editor (IEWL). Remember, any program that executes under your ID can access everything that your ID owns or is able to access, unless you take some precautions. Unlike in a PC environment, you can control concealed updates to your own program load libraries. This section describes how you can use each of the major access control packages (CA ACF2, CA Top Secret, or RACF) to limit unintentional access to your own load libraries. It also explains techniques for installing your own security module.
| Copyright © 2009 CA. All rights reserved. | Tell Technical Publications how we can improve this information |