Protecting access to XRC commands

Each installation is responsible for preventing the unauthorized use of XRC TSO commands and for controlling ICKDSF activity to XRC-managed volumes. The following are two ways to protect access to XRC commands:

For additional information about how to place commands in a protected library, refer to Placing TSO commands in an RACF-protected library. For additional information about how to define resource profiles, refer to Defining resource profiles in the RACF FACILITY class.