The following topics identify what functions RACF® provides
and the information that you should provide to your security administrator
to activate those functions. This
topic provides information about the following concepts
and tasks:
- Understanding Networking Profiles explains
how the values you select for the RACF NODES
profile determines what type of work and which users you want validated.
- Authorizing Jobs explains how you
can use RACF to validate inbound jobs from other nodes
in a network.
- Authorizing SYSOUT explains how you
can use RACF to validate inbound job output (SYSOUT) from
other nodes in a network.
- Translating Security Information explains
how RACF can be used to replace inbound userids, groupids,
or security labels with locally-defined values.
- Validating Work Based on the Submitter explains
how RACF can be used to validate inbound work using
the submitter's security information instead of the owner's security
information.
- Understanding Default Userids describes
how JES2 handles security information for work from incompatible nodes
and explains how JES2 handles security information belonging to store-and-forward
work. This topic also
describes how you can use RACF to manipulate default security
information.
- How JES2 Propagates Security Information explains
where JES2 obtains missing security information for NJE work.
- Defining Nodes as Local Input Sources explains
how you can use RACF to treat work from another node
as if the work originated at the home node.