Previous topic |
Next topic |
Contents |
Contact z/OS |
Library |
PDF
Using ID(*) on the access list z/OS Security Server RACF Security Administrator's Guide SA23-2289-00 |
|
If you have some users who are not defined to RACF®, you can use the ID(*) entry
on the access list instead of UACC to ensure that only RACF-defined
users, except those with the RESTRICTED attribute, can access the
resource. The following examples illustrate the difference between
UACC(READ) and ID(*) ACCESS(READ):
|
Copyright IBM Corporation 1990, 2014
|