z/OS UNIX System Services Planning
Previous topic | Next topic | Contents | Contact z/OS | Library | PDF


Using the FSACCESS class profile to restrict access

z/OS UNIX System Services Planning
GA32-0884-00

Using the FSACCESS class profile to restrict access provides a coarse-grained control to z/OS UNIX file systems and acts as a gatekeeper to the z/OS® UNIX file system. When the user is permitted to access the file system, any subsequent decisions to allow file access are based on z/OS UNIX permissions and ACLs. If a security decision is needed during access validation, the ck_access (IRRSKA00) callable service is used to determine whether they have access to the file system. RACF® provides authorization checking and auditing and then returns control to the file system. For more information about the ck_access callable service, see z/OS Security Server RACF Callable Services.

The basic steps to restrict access to the z/OS UNIX file system are to create a resource with the identical z/OS UNIX file system name in the FSACCESS class profile, permit selected z/OS UNIX users with UPDATE access to the resource, and then activate the FSACCESS class. When the FSACCESS class profile is active, RACF first uses the FSACCESS class profile resources to determine whether the user is authorized to access the file system. If the user is authorized to access the file system resource, then RACF uses the permission bits, access ACLs, and various UNIXPRIV class profiles to determine whether the user is authorized to access the individual file system objects with the requested access level. Read the section on protecting file system resources in z/OS Security Server RACF Security Administrator's Guide for details on how RACF uses FSACCESS when enforcing file system security.

Go to the previous page Go to the next page




Copyright IBM Corporation 1990, 2014