z/OS Security Server RACF System Programmer's Guide
Previous topic | Next topic | Contents | Contact z/OS | Library | PDF


Authorizing users to access resources

z/OS Security Server RACF System Programmer's Guide
SA23-2287-00

Having identified and verified the user, RACF® then controls interaction between the user and the system resources. RACF must authorize not only the users who can access resources, but also the way the user can access them, which depends on the user's purpose—reading, for example, or updating. RACF also can authorize when a user can access resources, by either time or day.

Go to the previous page Go to the next page




Copyright IBM Corporation 1990, 2014