z/OS Security Server RACF Security Administrator's Guide
Previous topic | Next topic | Contents | Contact z/OS | Library | PDF


How JES and RACF work together

z/OS Security Server RACF Security Administrator's Guide
SA23-2289-00

JES requests RACF® services by issuing the RACROUTE macro. The MVS™ system authorization facility (SAF) handles the RACROUTE macro invocation. If RACF is installed, SAF passes the security information specified by JES on the RACROUTE macro invocation to RACF. RACF evaluates the security information and returns the results of that evaluation to JES. JES then enforces the results of the security check, such as permitting or denying access to a data set, or allowing a job to execute.

Your JES system programmer can use JES2 macros to place additional calls to SAF in JES installation exits. See z/OS JES3 Customization, or z/OS JES2 Macros and z/OS JES2 Installation Exits.

JES code that can bypass RACF protection: Your installation can use JES initialization statements and JES installation exits to provide protection and, in some cases, to bypass RACF protection. For more information, see z/OS JES2 Initialization and Tuning Guide or z/OS JES3 Initialization and Tuning Guide.

Go to the previous page Go to the next page




Copyright IBM Corporation 1990, 2014