

Implementing Security with IBM RACF › Define Security to RACF
Define Security to RACF
To secure the CA WA CA 7 Edition processing environment under RACF, take the following steps:
- Modify the RACF Resource Descriptor Table to include the resource classes required by CA WA CA 7 Edition.
- Modify the RACF Router Table to identify processing options for the new resource classes.
- Modify the Started Procedures Table to add CA WA CA 7 Edition and ICOM started task names.
- Add user profiles for CA WA CA 7 Edition and ICOM to RACF.
- Define the data set security access requirements for CA WA CA 7 Edition and ICOM.
- Optionally, define CA WA CA 7 Edition as an application resource that RACF is to protect.
- Modify the CA WA CA 7 Edition initialization file to specify the security functions that RACF is to control.
- Define CA WA CA 7 Edition command and panel security access for users to RACF.
- Identify USERID requirements for jobs that CA WA CA 7 Edition is to submit.
Copyright © 2013 CA Technologies.
All rights reserved.
 
|
|