Each installation is responsible for preventing the unauthorized
use of XRC TSO commands and for controlling ICKDSF activity to XRC-managed
volumes. The following are two ways to protect access to XRC commands:
- Put the commands in a library that is protected by RACF®, a component of the Security
Server for z/OS.
- Define resource profiles in the RACF FACILITY
class and restrict access to those profiles.
For additional information about how to place commands in a protected
library, refer to Placing TSO commands in an RACF-protected library. For additional information
about how to define resource profiles, refer to Defining resource profiles in the RACF FACILITY class.