z/OS Security Server RACF Security Administrator's Guide
Previous topic | Next topic | Contents | Contact z/OS | Library | PDF


Controlling input to your system

z/OS Security Server RACF Security Administrator's Guide
SA23-2289-00

You can use RACF® to ensure that jobs entering your JES system are authorized for processing. JES carries security information about the submitter of a job internally and invokes the services of RACF at key points during JES processing, such as when a job enters the system through a TSO SUBMIT command or through a device reader.

You can protect several job entry resources including the use of job names and sources of job entry such as internal readers, device readers, RJP, RJE, and network nodes. This topic describes how RACF validates users, how to control the use of job names, and how to control the use of input sources. Authorizing network jobs and SYSOUT (NJE) provides a separate discussion of how to control security for inbound and outbound network jobs and SYSOUT.

Go to the previous page Go to the next page




Copyright IBM Corporation 1990, 2014