z/OS JES2 Initialization and Tuning Guide
Previous topic | Next topic | Contents | Contact z/OS | Library | PDF


Authorizing inbound work

z/OS JES2 Initialization and Tuning Guide
SA32-0991-00

The following topics identify what functions RACF® provides and the information that you should provide to your security administrator to activate those functions. This topic provides information about the following concepts and tasks:
  • Understanding Networking Profiles explains how the values you select for the RACF NODES profile determines what type of work and which users you want validated.
  • Authorizing Jobs explains how you can use RACF to validate inbound jobs from other nodes in a network.
  • Authorizing SYSOUT explains how you can use RACF to validate inbound job output (SYSOUT) from other nodes in a network.
  • Translating Security Information explains how RACF can be used to replace inbound userids, groupids, or security labels with locally-defined values.
  • Validating Work Based on the Submitter explains how RACF can be used to validate inbound work using the submitter's security information instead of the owner's security information.
  • Understanding Default Userids describes how JES2 handles security information for work from incompatible nodes and explains how JES2 handles security information belonging to store-and-forward work. This topic also describes how you can use RACF to manipulate default security information.
  • How JES2 Propagates Security Information explains where JES2 obtains missing security information for NJE work.
  • Defining Nodes as Local Input Sources explains how you can use RACF to treat work from another node as if the work originated at the home node.

Go to the previous page Go to the next page




Copyright IBM Corporation 1990, 2014