z/OS Security Server RACF Security Administrator's Guide
Previous topic | Next topic | Contents | Contact z/OS | Library | PDF


Protecting resources

z/OS Security Server RACF Security Administrator's Guide
SA23-2289-00

In the early releases of RACF®, the only resources that were protected were data sets. Over the years, enhancements to RACF, applications have broadened the meaning of the term resource to include the following:
  • Places in the system where data resides (such as data sets)
  • Places in the system through which data passes during processing (such as terminals)
  • The functions by which users work with data (such as commands)

Using RACF, you can protect resources so that only authorized users can access the resource in approved ways.

In general, you control access to a protected resource by creating a discrete or generic profile.

Discrete profiles protect only one resource. The name of the profile identifies to RACF which resource is protected. For example, a profile called SMITH.REXX.EXEC in class DATASET would protect the data set named SMITH.REXX.EXEC.

Generic profiles protect one or more resources that have the same security requirements. In many cases, some of the characters in the resource names are the same. For example, a profile called SMITH.** in class DATASET would protect all of SMITH's data sets that did not have a more specific profile defined.

In most general resource classes, you can also provide a top generic profile that protects all of the resources that are not otherwise protected.

Tip: A top generic profile for a class should have a profile name of ** (rather than *) so that you can issue the RLIST command to display the profile itself.

Using generic profiles can greatly reduce the amount of RACF profile maintenance done by a RACF administrator.

Examples of discrete and generic profiles are shown throughout this document.

Go to the previous page Go to the next page




Copyright IBM Corporation 1990, 2014