Previous topic |
Next topic |
Contents |
Contact z/OS |
Library |
PDF
Protecting the vector facility z/OS Security Server RACF Security Administrator's Guide SA23-2289-00 |
|
If your processor has a vector facility, you can use RACF® to protect it. To do this, perform the following steps.
If your installation does not need to control the use of the vector facility, you can define an entry for IEAVECTOR in the global access checking table. Global access checking allows your installation to bypass normal RACF authorization checking and, thereby, minimize processing. To define an entry for the vector facility in
the global access checking table, issue the following commands.
For more information, see Setting up the global access checking table. |
Copyright IBM Corporation 1990, 2014
|