Previous topic |
Next topic |
Contents |
Contact z/OS |
Library |
PDF
Authorizing users to access resources z/OS Security Server RACF System Programmer's Guide SA23-2287-00 |
|
Having identified and verified the user, RACF® then controls interaction between the user and the system resources. RACF must authorize not only the users who can access resources, but also the way the user can access them, which depends on the user's purpose—reading, for example, or updating. RACF also can authorize when a user can access resources, by either time or day. |
Copyright IBM Corporation 1990, 2014
|