S550-0434-03

Abstract for PSF for z/OS: Security Guide

Abstract for PSF for z/OS: Security Guide

Purpose of this information: This information is designed to help programmers, analysts, and administrators who install, customize, or maintain Print Services Facility™ (PSF) for z/OS® (hereafter referred to as PSF) as a component of a trusted computing base.1

This information describes the PSF function called print labeling. This function can be used to produce printed output containing special labels. These labels can be used for security purposes or other installation-defined purposes.

Note:
Print labeling can be done with PSF even if PSF is not a part of a trusted computing base.

Who should read this information: You should use this information if you are a system programmer, a system analyst, a security administrator, a security auditor, or an application programmer who is responsible for data security.

You should be familiar with the material contained in PSF for z/OS: Customization and PSF for z/OS: User’s Guide before attempting any of the procedures described in this information.

Related information: For additional information about z/OS and PSF for z/OS, refer to these Web pages:

http://www.ibm.com/systems/z/os/zos/

http://www.ibm.com/systems/z/zos/printsoftware/index.html

http://www.ibm.com/systems/z/zos/printsoftware/psfhome_z_ww.html

To obtain the latest documentation updates for z/OS base elements and optional features that result from DOC APARs and PTFs, refer to this DOC APARs and ++HOLD DOC Web page:

http://publibz.boulder.ibm.com/cgi-bin/bookmgr_OS390/Shelves/ZDOCAPAR

To obtain the latest documentation updates for PSF for z/OS, refer to these members in SYS1.SAMPLIB:

Member Publication
APSGADP4 PSF for z/OS: AFP Download Plus
APSGCUS4 PSF for z/OS: Customization
APSGDGN4 PSF for z/OS: Diagnosis
APSGDLG4 PSF for z/OS: Download for z/OS
APSGMAC4 PSF for z/OS: Messages and Codes
APSGSEC4 PSF for z/OS: Security Guide
APSGUSR4 PSF for z/OS: User’s Guide

1.
A trusted computing base consists of components that together enforce a unified security policy over a computing environment. See Introducing Trusted Computing Base Components for more information.