RACF – Defining and Managing Users in RACF 2.5
This course details the skills that are required by a security administrator, programmer, or DBA in using RACF to secure systems and data. It explains how to define and maintain individual users within RACF, using several different interfaces.
Application programmers, systems programmers, database administrators, security administrators, and anyone requiring knowledge about how user access is defined using RACF on the z/OS platform.
Successful completion of the Interskill RACF – Introduction course or equivalent knowledge.
- After completing this course, the student will be able to:
- Identify User Profiles and their structure
- Enter commands used to define and maintain User profiles
- List, modify, and delete User profiles
Defining Users to RACF – Basic
Purpose of a User Profile
Creating a User Profile
User Profile Structure – Segments and Fields
Base Segment Requirements
Managing Passwords and Password Phrases
Defining Protected User IDs
Defining Users to RACF – Advanced
Using Optional User Profile Segments
Other Segments – DCE, KERB, LANGUAGE, LNOTES, NDS, NETVIEW, OPERPARM, OVM, PROXY, and WORKATTR
Maintaining and Managing User Profiles
Displaying User Profile Contents
Modifying a User Profile
Using TSO Commands and ISPF to Modify a User Profile
Removing User Profiles from RACF