RACF - RACF and z/OS UNIX 2.4
The “RACF - RACF and z/OS UNIX” course describes the requirements for configuring security in a z/OS UNIX environment using RACF. It covers the creation and use of UID and GID definitions as well as file and directory permission bits and access control lists that are referenced when accessing those z/OS UNIX resources.
Application programmers, systems programmers, database administrators, security administrators and anyone requiring knowledge about securing z/OS UNIX users and system resources using RACF.
Successful completion of the “RACF - Defining and Managing Users in RACF” and “RACF - Managing RACF Groups and Administrative Authorities” course or equivalent knowledge.
- After completing this course, the student will be able to:
- Describe how z/OS UNIX users are defined
- Define and Maintain z/OS UNIX File Permissions and Access Control Lists
- Invoke and use ISHELL to maintain z/OS UNIX file and directory access
Defining and Managing z/OS UNIX Users
How z/OS UNIX Security Requirements Differ
UID and GID Requirements
OMVS Profile Segment
Automatically Assigning UIDs and GIDs
Unique and Shared IDs
Displaying UID and GID Information
z/OS UNIX Attributes in the User Profile
Updating OMVS Segment Data
Protecting z/OS UNIX Resources
Protecting z/OS UNIX Files and Directories
Creating and Updating File Permission Bits
Using Access Control Lists
Controlling Access to File Systems
Using the ISPF UNIX Shell to Protect File and Directory Access
Restricting Access to z/OS UNIX File Systems
Using FACILITY Class Profiles to Protect z/OS UNIX Functions
RACF - RACF and z/OS UNIX 2.4 Mastery Test
Instant Web Chat:
- Chat with tech support or
- have a product question?
Contact our Learning Consultants or call us at 770-872-4278