Assigning the RACF TRUSTED attribute

You can use RACF® to assign the TRUSTED attribute to key started procedures and address spaces. Doing so generally allows the started procedure or address space to bypass RACF authorization checking and to successfully access or create any resource it needs.

A trusted started procedure or address space is treated as a z/OS® UNIX superuser if a z/OS UNIX user identifier (UID) is assigned to it in the OMVS segment, even when the assigned UID is not 0.

Guidelines:
Assign the TRUSTED attribute to the following z/OS started tasks and address spaces:
Optional candidates for the TRUSTED attribute include the following:

For more information, see "Associating started procedures and jobs with user IDs" in z/OS Security Server RACF System Programmer's Guide, and "Using Started Procedures" in z/OS Security Server RACF Security Administrator's Guide.