z/OS Security Server RACF System Programmer's Guide
Previous topic | Next topic | Contents | Contact z/OS | Library | PDF


Group name and user ID occurrences that IRRUT100 lists

z/OS Security Server RACF System Programmer's Guide
SA23-2287-00

IRRUT100 provides information on the following occurrences:

For groups:
  • The group name is defined as a group in the RACF® database.
  • The group is a subgroup of group xx.
  • The group is a superior group of group xx.
  • The group is the default group for user xx.
  • The group is a connect group for user xx.
  • The group was the connect group when the user created data set profile xx.
  • The group name is the high-level qualifier of data set profile xx.
  • The group has standard access to data set profile xx.
  • The group has standard access to general resource xx.
  • The group is the owner of user xx.
  • The group is the owner of group xx.
  • The group is the owner of data set profile xx.
  • The group is the owner of general resource xx.
  • The group is the owner of connect profile xx.
  • The group exists in the conditional access list of general resource profile xx.
  • The group exists in the conditional access list for data set profile xx.
  • The group is the resource owner of profile xx.
  • The group is a member of the GROUPS field in the TME segment of ROLE-class general resource profile xx.
For user IDs:
  • The user ID is defined as a user in the RACF database.
  • The user is the owner of group xx.
  • The user is listed as a member of group xx. The user might not be listed as a member of the group if it is a universal group.
  • The user is the owner of user xx.
  • The user is the owner of data set profile xx.
  • The user is the owner of general resource xx.
  • The user has standard access to data set profile xx.
  • The user has standard access to general resource xx.
  • The user ID is the high-level qualifier of data set profile xx.
  • The user is the owner of connect profile xx.
  • The user is to be notified when access violations occur against data set xx.
  • The user is to be notified when access violations occur against general resource xx.
  • The user exists in the conditional access list of data set profile xx.
  • The user exists in the conditional access list of general resource profile xx.
  • The user is the resource owner of profile xx.
  • The user appears as RACLINK entry (user ID association) node.userid for user ID profile xx.
  • The user ID is the second qualifier of FILE profile xx.
  • The user ID is the second qualifier of DIRECTRY profile xx.
  • The user exists in the application data field of general resource profile xx.

Go to the previous page Go to the next page




Copyright IBM Corporation 1990, 2014