Protecting IBM Z Table Accelerator tables

IBM Z® Table Accelerator tables can be protected in the library using read and write passwords, and can be protected when loaded into memory using a LOCK-LATCH. These passwords offer only limited protection against unauthorized use of IBM Z Table Accelerator tables. More formal security can be implemented using security tools such as Resource Access Control Facility (RACF), eTrust CA-ACF2 Security for z/OS (ACF2) and eTrust CA-Top Secret Security for z/OS.

Note: See your IBM Z Table Accelerator administrator if a table password has been lost or forgotten.