Previous topic |
Next topic |
Contents |
Contact z/OS |
Library |
PDF
Example: Trusted, semitrusted, and untrusted Nodes z/OS Security Server RACF Security Administrator's Guide SA23-2289-00 |
|
Figure 1 shows a sample NJE network in which some nodes are trusted (see Understanding mixed security environments), some nodes are semitrusted (verification is done on inbound work), and some nodes are not trusted (no inbound work is allowed to run). Figure 1. Example: Trusted,
semitrusted, and untrusted nodes
In this example, profiles on node MYNODE control inbound work as follows: Trusted nodes:
Semitrusted nodes:
Untrusted node:
Note: To prevent any unknown nodes from submitting work to be done
on your node, create the following profile:
|
Copyright IBM Corporation 1990, 2014
|