Understanding RACF

This introduces students to the functions and facilities of the RACF product and shows them how to use RACF to protect their own programs and data. Students also learn how to interpret access violation messages so that they can communicate more efficiently with their RACF administrator.

Students learn to:

  • Understand the need for properly managed security procedures;
  • Identify those areas, in their own environment where security is required;
  • Understand the structure of RACF including: profiles, resource classes, groups, access authority, audit levels;
  • Effectively use RACF to protect their own programs and data;
  • Use the RACF auditing facilities to monitor access to their own programs and data;
  • Interpret the RACF access violation messages;
  • Understand the role of: the RACF administrator and the RACF auditor.

Schedule

datedur.lang.locationprice 
24 Jan1Eweb based 788 EUR (excl. VAT)
14 Feb1Eweb based 788 EUR (excl. VAT)
21 Mar1Eweb based 788 EUR (excl. VAT)
SESSION INFO AND ENROLMENT

Intended for

This course is recommended for anyone working in RACF.

Background

To benefit from this course, participants need: a working knowledge of TSO/ISPF and an understanding of JCL and job submission (cf. courses ISPF/PDF basics, MVS and z/OS overview and JCL).

Main topics

  • The need for properly managed security procedures
  • Identification of those areas, in their own environment, where security is required
  • The structure of RACF including: profiles • resource classes • groups • access authority • audit levels
  • Effective use of RACF to protect their own programs and data
  • Use of the RACF auditing facilities to monitor access to their own programs and data
  • Interpretation of the RACF access violation messages
  • The role of the RACF administrator and the RACF auditor

Training method

Lecturing and exercises.

Duration

1 day.

Course leader

RSM Technology.


SESSION INFO AND ENROLMENT