z/OS Security Server RACF General User's Guide
Previous topic | Next topic | Contents | Contact z/OS | Library | PDF


Listing the contents of general resource profiles

z/OS Security Server RACF General User's Guide
SA23-2298-00

You can list the contents of general resource profiles that you own by using the RLIST command.

The RLIST command lists the contents of general resource profiles in a particular resource class. If you specify a profile that you do not have access to, you might receive an “access violation” message from the RLIST command.

Note: To see the access list for a resource, you must be the owner of the resource, or have ALTER access to the resource.
  1. Find the name of the class that represents the resource you want to search. Valid class names are those specified in the class descriptor table (CDT). For a list of general resource classes defined in the class descriptor table supplied by IBM®, see the topic on supplied resource classes in z/OS Security Server RACF Security Administrator's Guide.
  2. Specify the RACF® profiles you want to list. To list the contents of general resource profiles that you own, use the RLIST command with the class name and a profile name. Type:
    RLIST classname profile-name
  • Example 1:
    To list the contents of resource profile IDTERMS in class TERMINAL, type:
    RLIST TERMINAL IDTERMS
  • Example 2:
    To list the contents of all resource profiles in class TERMINAL, type:
    RLIST TERMINAL *
These examples show only some of the operands that are available to use on the RLIST command. The complete syntax of the RLIST command, with descriptions of all the command operands, is described in z/OS Security Server RACF Command Language Reference. In particular, you might want to read about these operands:
  • ALL

    Displays all information specified for each resource.

  • AUTHUSER

    Displays the standard and conditional access lists for the profile. This information is useful to have before you use the PERMIT command to allow or deny access to the resource.

Go to the previous page Go to the next page




Copyright IBM Corporation 1990, 2014