z/OS Security Server RACF General User's Guide
Previous topic | Next topic | Contents | Contact z/OS | Library | PDF


RACF commands for general user tasks

z/OS Security Server RACF General User's Guide
SA23-2298-00

Table 1 shows which command to use for each task and where it is described.

Table 1. RACF command table for general user tasks
Task Command Where described
Find out how you are defined to RACF®
LISTUSER
Finding out how you are defined to RACF
Find out what CICS® information RACF has about you
LISTUSER your-userid CICS NORACF
Finding out what CICS information RACF has about you
Find out what custom field information RACF has about you
LISTUSER your-userid CSDATA NORACF
Finding out what custom field information RACF has about you
Find out what DCE information RACF has about you
LISTUSER your-userid DCE NORACF
Finding out what DCE information RACF has about you
Find out what distributed identity information RACF has about you
RACMAP
Finding out what distributed identity information RACF has about you
Find out what DFSMSdfp information RACF has about you
LISTUSER your-userid DFP NORACF
Finding out what DFSMSdfp information RACF has about you
Find out what EIM information RACF has about you
LISTUSER your-userid EIM NORACF
Finding out what EIM information RACF has about you
Find out what Kerberos information RACF has about you
LISTUSER your-userid KERB NORACF
Finding out what Kerberos information RACF has about you
Find out what language information RACF has about you
LISTUSER your-userid LANGUAGE NORACF
Finding out what language information RACF has about you
Find out what information related to Lotus® Notes® RACF has about you
LISTUSER your-userid LNOTES NORACF
Finding out what Lotus Notes information RACF has about you
Find out what NetView® information RACF has about you
LISTUSER your-userid NETVIEW NORACF
Finding out what NetView information RACF has about you
Find out what OPERPARM information RACF has about you
LISTUSER your-userid OPERPARM NORACF
Finding out what OPERPARM information RACF has about you
Find out what OpenExtensions information RACF has about you
LISTUSER your-userid OVM NORACF
Finding out what OpenExtensions information RACF has about you
Find out what TSO/E information RACF has about you
LISTUSER your-userid TSO NORACF
Finding out what TSO/E information RACF has about you
Find out what WORKATTR information RACF has about you
LISTUSER your-userid WORKATTR NORACF
Finding out what WORKATTR information RACF has about you
Find out what z/OS® UNIX System Services (z/OS UNIX) information RACF has about you
LISTUSER your-userid OMVS NORACF
Finding out what z/OS UNIX information RACF has about you
List all of your user ID associations
RACLINK LIST
Finding out what user ID associations are defined for you
List all of your user ID associations with a specific node, user ID, or both
RACLINK LIST(node.userid)
Finding out what user ID associations are defined for you
List all of your digital certificates
RACDCERT LIST
Listing your digital certificate information
List all of your digital certificate key rings
RACDCERT LISTRING(*)
Listing your digital certificate information
Change your password (pw)
PASSWORD PASSWORD(current-pw new-pw)
Changing your password
Change your password and password phrase interval
PASSWORD INTERVAL(interval-you-want)
or
PHRASE INTERVAL(interval-you-want)
Changing your password
Change your password phrase (pp)
PASSWORD PHRASE (current-pp new-pp)
or
PHRASE PHRASE (current-pp new-pp)
Changing your password phrase
Log on to a group other than your default group
LOGON userid GROUP(groupname)
Note: The LOGON command is a TSO command, not a RACF command.
Logging on to TSO/E with a group other than your default group
Log on with a security label other than your default security label
LOGON userid
  SECLABEL(security-label)
Note: The LOGON command is a TSO command, not a RACF command.
Logging on with a security label other than your default security label
Allow another user to submit your jobs
PERMIT CLASS(SURROGAT) userid.SUBMIT
  ID(surrogate-userid)
  ACCESS(READ)
Allowing another user to submit your jobs
Enable your user IDs to have their passwords become synchronized as they are changed
RACLINK
  DEFINE(target-node.target-userid)
  PEER(PWSYNC)

RACLINK APPROVE(node.userid)
Note: These commands need to be entered only once. All passwords are automatically changed after the password is changed for any one of the associated user IDs.
Defining a peer user ID association with password synchronization
Define a peer user ID association with password synchronization
RACLINK
  DEFINE(target-node.target-userid)
  PEER(PWSYNC)
Defining a peer user ID association with password synchronization
Define a peer user ID association without password synchronization
RACLINK
  DEFINE(target-node.target-userid)
  PEER(NOPWSYNC)
Defining a peer user ID association with password synchronization
Define a managed user ID association
RACLINK
  DEFINE(target-node.target-userid)
  MANAGED
Defining a managed user ID association
Approve a user ID association
RACLINK APPROVE(node.userid)
Approving user ID associations
Delete a pending or existing user ID association
RACLINK UNDEFINE(node.userid)
Deleting user ID associations
Create a discrete profile to protect a cataloged data set
ADDSD 'dataset-name'
  UACC(access-authority)
Creating a discrete profile to protect a data set
Create a discrete profile to protect an uncataloged data set
ADDSD 'dataset-name' UNIT(type)
  VOLUME(volume-serial)
  UACC(access-authority)
Creating a discrete profile to protect a data set
Create a generic profile to protect a data set
ADDSD
  'dataset-name-with-generic-char.'
  UACC(access-authority)

or

ADDSD 'dataset-name'
  UACC(access-authority) GENERIC
Creating a generic profile to protect a data set
Find out how a data set is protected
LISTDSD DATASET('dataset-name') ALL

or

LISTDSD DATASET('dataset-name') ALL
  GENERIC
Finding out how a data set is protected
Check what data set profiles you have
SEARCH
Finding out what data set profiles you have
Delete a data set profile
DELDSD 'profile-name'
Deleting a data set profile
Change a data set's universal access authority
ALTDSD 'profile-name'
  UACC(access-authority)
Changing the universal access authority to a data set
Permit an individual or a group to use a data set
PERMIT 'profile-name'
  ID(userid|groupname)
  ACCESS(level)
Permitting an individual or a group to use a data set
Deny an individual or a group use of a data set
PERMIT 'profile-name'
  ID(userid|groupname) ACCESS(NONE)

or

PERMIT 'profile-name'
  ID(userid|groupname) DELETE
Denying an individual or a group use of a data set
Search for general resource profile names
SEARCH CLASS(classname)
Searching for general resource profile names
List the contents of general resource profiles
RLIST classname profile-name
Listing the contents of general resource profiles
Permit an individual or a group to use a general resource
PERMIT profile-name
  CLASS(classname)
  ID(userid|groupname)
  ACCESS(access-authority)
Permitting an individual or a group to use a general resource
Deny an individual or a group the use of a general resource
PERMIT profile-name CLASS(classname)
  ID(userid|groupname) ACCESS(NONE)

or

PERMIT profile-name CLASS(classname)
  ID(userid|groupname) DELETE
Denying an individual or a group use of a general resource

Go to the previous page Go to the next page




Copyright IBM Corporation 1990, 2014