z/OS Security Server RACF Security Administrator's Guide
Previous topic | Next topic | Contents | Contact z/OS | Library | PDF


Sample automatic command direction profiles

z/OS Security Server RACF Security Administrator's Guide
SA23-2289-00

You can activate automatic direction of commands without activating automatic direction of application updates by using SET AUTODIRECT NOAUTOAPPL. You can also turn off password propagation by issuing the SET AUTODIRECT NOAUTOPWD command. See z/OS Security Server RACF Command Language Reference for details.

Some examples of using profiles to control automatic command direction follow. For each example, assume that no other profiles beginning with AUTODIRECT are present in the RRSFDATA class.
  • To disable automatic command direction for TAPEVOL profiles and direct all other commands to all remote nodes:
    AUTODIRECT.*.TAPEVOL.*     UACC(NONE), no users on access list
    AUTODIRECT.**              UACC(READ), no users on access list
  • To direct ADDUSER commands issued by BOB to all remote nodes:
    AUTODIRECT.*.USER.ADDUSER  UACC(NONE), BOB on access list with READ access
  • To disable automatic command direction for TAPEVOL and RRSFDATA profiles and direct all other commands to all remote nodes:
    AUTODIRECT.*.TAPEVOL.*     UACC(NONE), no users on access list
    AUTODIRECT.*.RRSFDATA.*    UACC(NONE), no users on access list
    AUTODIRECT.**              UACC(READ), no users on access list
  • To enable automatic command direction only to NODE1 for the USER and GROUP classes:
    AUTODIRECT.NODE1.USER.*    UACC(READ), no users on access list
    AUTODIRECT.NODE1.GROUP.*   UACC(READ), no users on access list
    AUTODIRECT.**              UACC(NONE), no users on access list

Go to the previous page Go to the next page




Copyright IBM Corporation 1990, 2014