z/OS Security Server RACF Security Administrator's Guide
Previous topic | Next topic | Contents | Contact z/OS | Library | PDF


How RACF meets security needs

z/OS Security Server RACF Security Administrator's Guide
SA23-2289-00

RACF® satisfies the preferences of the end user without compromising any of the concerns raised by security personnel. The RACF approach to data security is to provide an access control mechanism that:
  • Offers effective user verification, resource authorization, and logging capabilities
  • Supports the concept of user accountability
  • Is flexible
  • Has little noticeable effect on the majority of end users, and little or no impact on an installation's current operation
  • Is easy to install and maintain

Go to the previous page Go to the next page




Copyright IBM Corporation 1990, 2014