Previous topic |
Next topic |
Contents |
Contact z/OS |
Library |
PDF
Authorizing access to RACF-protected applications z/OS Security Server RACF Security Administrator's Guide SA23-2289-00 |
|
You can control access to some applications (for example, IMS™ and CICS® regions)
by defining them to RACF® as
resources in the APPL class. When the user attempts to sign on the
application, the application uses RACF to
verify the user's identity and his authority to use that application. RACF does an authorization check
to determine the user's authorization to the application.
Note:
|
Copyright IBM Corporation 1990, 2014
|