z/OS Security Server RACF System Programmer's Guide
Previous topic | Next topic | Contents | Contact z/OS | Library | PDF


Using IEHMOVE with the COPYAUTH parameter

z/OS Security Server RACF System Programmer's Guide
SA23-2287-00

On the MOVE and COPY statements of the IEHMOVE system utility, you can specify the COPYAUTH parameter. (Note: You cannot move a data set with a target volume specified that is the same as the originating volume unless you code RENAME on the MOVE statement.) The COPYAUTH parameter enables you to use the discrete profile of the old RACF-protected data set as a model to build a discrete profile for and RACF-indicate the new data set.

This modeling capability causes RACF® to copy directly the following fields:
  • Access lists
  • Level
  • UACC
  • Warning and logging options (auditing flags)
  • Installation data
  • Security categories and security levels
  • Erase option indicator
  • User to be notified
The owner (the content of the owner field) is determined by the following rules:
  • If the current user does not have the OPERATIONS or group-OPERATIONS attribute, then the user becomes the owner of the data set profile.
  • If the current user has the OPERATIONS or group-OPERATIONS attribute, then either:
    • For a new user data set that has a different high-level qualifier from the modeled data set name, the user whose user ID is the high-level qualifier of the new data set name becomes the owner.
    • In all other cases, IEHMOVE copies the owner field directly from the model.
Note: A data set that is not RACF-indicated will not be protected after moving unless there is a suitable generic profile on the destination system.

Go to the previous page Go to the next page




Copyright IBM Corporation 1990, 2014