Controlling access to XRC commands
The following are two ways to protect access to XRC commands:
Put the commands in a library that is protected by RACF®.
Define resource profiles in the RACF facility class and restrict access to those profiles.
Placing TSO commands in an RACF-protected library
Defining resource profiles in the RACF FACILITY class
Parent topic:
Setting up the extended remote copy environment