z/OS Security Server RACF System Programmer's Guide
Previous topic | Next topic | Contents | Contact z/OS | Library | PDF


Summary of installation-exit callers

z/OS Security Server RACF System Programmer's Guide
SA23-2287-00

Table 1 and Table 2 list the macros, commands, and utilities that give control to each exit routine.

Table 1. RACF installation-exits cross-reference table—Part 1 of 2
Functions ICHNCV00 ICHRDX01 ICHRDX02 ICHRCX01 ICHRCX02 IRRACX01 IRRACX02 ICHRIX01 ICHRIX02 IRRVAF01
ADDGROUP           Note 4
ADDSD X (Note 1, Note 2) Note 1 Note 2      
ADDUSER           Note 4
ALTDSD     Note 2      
ALTGROUP           Note 4
ALTUSER           Note 4
DELDSD X (Note 1, Note 2) Note 1 Note 2      
DELGROUP            
DELUSER            
LISTDSD X (Note 2)   Note 2      
PASSWORD            
PERMIT X (Note 2)   Note 2      
RALTER     Note 2      
RDEFINE   Note 1 Note 2      
RDEFINE FROM (on data sets) X (Note 1, Note 2) Note 1 Note 2      
RDELETE   Note 1 Note 2      
REMOVE            
RLIST     X      
SEARCH X   X Note 3 Note 3  
SETROPTS RACLIST       Note 3 Note 3  
RACROUTE REQUEST= DEFINE X X Note 2 Note 3 Note 3  
RACROUTE REQUEST=AUTH X   X Note 3 Note 3  
RACROUTE REQUEST= VERIFY     Note 2 X X  
RACROUTE REQUEST= LIST            
RACROUTE REQUEST= FASTAUTH            
RACROUTE REQUEST= EXTRACT     Note 2 X    
RACROUTE REQUEST= SIGNON       Note 3 Note 3  
IRRUT100 X          
Note:
1.
The function invokes RACROUTE REQUEST=DEFINE processing and could be affected by the DEFINE request exits.
2.
The function can invoke RACROUTE REQUEST=AUTH processing and could be affected by the AUTH request exits.
3.
The function can invoke RACROUTE REQUEST=VERIFY processing and could be affected by the VERIFY request exits.
4.
When a field in the CSDATA segment is specified, the exit gets control after each suboperand of the CSDATA keyword has been parsed according to the rules for the field specified in the CFDEF segment in the corresponding CFIELD profile.
Table 2. RACF installation-exits cross-reference table—Part 2 of 2
Function ICHRLX01 ICHRLX02 ICHRFX01 ICHRFX02 ICHRFX03 ICHRFX04 ICHPWX01 ICHPWX11 ICHCNX00 ICHCCX00 IRREVX01
ADDGROUP             X
ADDSD         X   X
ADDUSER       X     X
ALTDSD         X   X
ALTGROUP             X
ALTUSER     X X     X
DELDSD         X   X
DELGROUP           X X
DELUSER           X X
LISTDSD         X   X
PASSWORD     X X     X
PERMIT         X   X
RALTER Note 5 Note 6         X
RDEFINE Note 5 Note 6     X   X
RDEFINE FROM (on data sets)             X
RDELETE             X
REMOVE           X X
RLIST             X
SEARCH         X   X
SETROPTS RACLIST Note 7           X
RACROUTE REQUEST= DEFINE              
RACROUTE REQUEST= AUTH              
RACROUTE REQUEST= VERIFY     X X      
RACROUTE REQUEST= LIST X            
RACROUTE REQUEST= FASTAUTH   X          
RACROUTE REQUEST= EXTRACT         X    
RACROUTE REQUEST= SIGNON              
IRRUT100         X    
Note:
5.
When the user is not SPECIAL and has specified ADDMEM and DELMEM, this function invokes RACROUTE REQUEST=LIST processing and could be affected by the LIST request exits.
6.
When the user is not SPECIAL and has specified ADDMEM and DELMEM, the function invokes RACROUTE REQUEST=FASTAUTH and could be affected by the FASTAUTH request exits.
7.
The function invokes RACROUTE REQUEST=LIST processing and could be affected by the LIST request exits.

Go to the previous page Go to the next page




Copyright IBM Corporation 1990, 2014