z/OS Security Server RACF Security Administrator's Guide
Previous topic | Next topic | Contents | Contact z/OS | Library | PDF


Authorizing access to RACF-protected applications

z/OS Security Server RACF Security Administrator's Guide
SA23-2289-00

You can control access to some applications (for example, IMS™ and CICS® regions) by defining them to RACF® as resources in the APPL class. When the user attempts to sign on the application, the application uses RACF to verify the user's identity and his authority to use that application. RACF does an authorization check to determine the user's authorization to the application.
  • If there is a matching profile in the APPL class, RACF performs normal authorization checking as described in Authorizing access to RACF-protected resources.
  • If there is no matching profile in the APPL class, RACF allows the user to access the application.
Note:
  1. The REQUEST=AUTH and REQUEST=VERIFY preprocessing and postprocessing exit routines are available during application authorization checking.
  2. Global access checking is not available during application authorization checking performed by REQUEST=VERIFY.
  3. For information about using IMS with RACF, visit IBM Information Management Software for z/OS Solutions Information Center.
  4. For information about using CICS with RACF, visit CICS Transaction Server for z/OS Information Center.

Go to the previous page Go to the next page




Copyright IBM Corporation 1990, 2014