Previous topic |
Next topic |
Contents |
Contact z/OS |
Library |
PDF
Preparing to run an application with the SAF user mapping plug-in implementation z/OS Security Server RACF Macros and Interfaces SA23-2288-00 |
|
Before the application can run using the default SAF user mapping
plug-in implementation, EIM and RACF® must
be set up with the information used by that plug-in.
Note: Other SAF
user mapping plug-in implementations might require a different setup.
See Writing your own SAF user mapping plug-in implementation for the details.
To set up EIM, perform the following steps.
If the C/C++ application is unauthorized (that is, problem program
state and problem program key), the caller of the default SAF user
mapping plug-in implementation needs to have access to either of the
following RACF resources in
the FACILITY class.
In addition, all unauthorized applications that use the default SAF user mapping plug-in implementation must run in a clean address space. Minimally, the unauthorized application must be program-controlled. See z/OS Security Server RACF Security Administrator's Guide for details on how to set up program control for the application. Logging of the EIM lookup operations can also be performed by defining RACF profiles. See z/OS Integrated Security Services EIM Guide and Reference for the setup instructions. |
Copyright IBM Corporation 1990, 2014
|