Back to Courses

RACF – Introduction 2.5

Duration

3 hours

Overview

Description

This course introduces the learner to IBM’s RACF security software, explaining how it has evolved and how it is typically used in z/OS, and can interact with non-z/OS workloads. It discusses the importance of security, and the types of resources it protects. The course then introduces the concept of user and group profiles and describes from a user perspective, RACF’s interaction with day-to-day user tasks. Examples showing how various users can interact with RACF are also provided.

Audience

Application programmers, systems programmers, database administrators, security administrators, and anyone requiring knowledge about the use of IBM’s RACF security software.

Prerequisites

Completion of the Interskill IBM(z/OS) – The Evolving Mainframe and IBM (z/OS) – Working with the Mainframe courses, or equivalent knowledge. Familiarization with TSO and ISPF software will be of benefit.

Objectives

After completing this course, the student will be able to:

  • Describe how RACF protects resources
  • Describe how RACF uses profiles to define and control access to resources
  • Identify TSO commands use to interact with RACF
  • Describe other interfaces to RACF

Course Content

Introduction to RACF

Importance of RACF
Protecting Data and Resources
How RACF Authenticates Requests for System Resources
Profiles
RACF Job Responsibilities
Identifying and Authorizing Users
Data Set Access Lists
General Resource Classes
Logging and Reporting System Accesses

Interacting with RACF

RACF TSO Command Interface
Issuing RACF Commands to a Remote z/OS System
Type of Commands Entered by Users and Specialists
RACF ISPF Interface
Batch and Programming Interfaces
zSecure

RACF – Introduction 2.5 Mastery Test