Previous Topic: APPLID Protection

Next Topic: How Job Submission Works with IBM RACF Enabled


How the RACF Security Interface Works

When a file transfer request is received, the system performs the following actions:

Note: Access events are logged by SMF under both the CA XCOM Data Transport and the user's UID.