Previous topic |
Next topic |
Contents |
Contact z/OS |
Library |
PDF
Protecting applications z/OS Security Server RACF Security Administrator's Guide SA23-2289-00 |
|
For applications that specify the APPL operand on the RACROUTE REQUEST=VERIFY macro, you can use a profile in the APPL class to control which users can access the application. To do this, perform the following steps:
For information on how authorization checking takes place, see Authorizing access to RACF-protected applications. For details about how CICS® uses APPL profiles to control access to CICS regions, visit CICS Transaction Server for z/OS Information Center.. |
Copyright IBM Corporation 1990, 2014
|