Previous topic |
Next topic |
Contents |
Contact z/OS |
Library |
PDF
Controlling input to your system z/OS Security Server RACF Security Administrator's Guide SA23-2289-00 |
|
You can use RACF® to ensure that jobs entering your JES system are authorized for processing. JES carries security information about the submitter of a job internally and invokes the services of RACF at key points during JES processing, such as when a job enters the system through a TSO SUBMIT command or through a device reader. You can protect several job entry resources including the use of job names and sources of job entry such as internal readers, device readers, RJP, RJE, and network nodes. This topic describes how RACF validates users, how to control the use of job names, and how to control the use of input sources. Authorizing network jobs and SYSOUT (NJE) provides a separate discussion of how to control security for inbound and outbound network jobs and SYSOUT. |
Copyright IBM Corporation 1990, 2014
|