List of subtasks

Subtasks Associated procedure
Preparing RACF® Steps for preparing RACF
Defining z/OS® users to RACF Steps for defining z/OS UNIX users to RACF
Managing group identifiers and user identifiers (GIDs and UIDs)

Steps for obtaining security information about users

Steps for setting up field-level access

Defining groups to RACF Steps for creating z/OS UNIX groups
Allowing users to transfer file ownership to any UID or GID on the system

Steps for authorizing selected users to transfer ownership of any file

Steps for setting up the CHOWN.UNRESTRICTED profile

Giving superuser authority to users. Steps for setting up BPX.SUPERUSER
Changing superusers from UID(0) to a unique nonzero UID Steps for changing a superuser from UID(0) to a unique nonzero UID
Setting up the FILE.GROUPOWNER.SETGID profile Steps for setting up the FILE.GROUPOWNER.SETGID profile
Creating and activating sanction lists Steps for creating a sanction list

Steps for activating the sanction list

Maintaining the security level of the system Steps for maintaining the security level of the system
Activating FSACCESS checking Steps for giving selected users or groups access to a z/OS UNIX file system
If you require a high level of security in your z/OS system and do not want superusers to have access to z/OS resources such as SYS1.PROCLIB, read the following topics: