z/OS Security Server RACF Security Administrator's Guide
Previous topic | Next topic | Contents | Contact z/OS | Library | PDF


Using restricted user IDs with a shared z/VM system

z/OS Security Server RACF Security Administrator's Guide
SA23-2289-00

If you share the RACF® database with a z/VM® system, restricted user IDs can be used to access resources they are not specifically authorized to access on the z/VM system. When you share the RACF database with a z/VM system, you can avoid this by adding each restricted user ID to the access list of each z/VM resource with the access authority of NONE.

A LISTUSER command issued for a restricted user ID from a z/VM system does not display the RESTRICTED attribute.

Go to the previous page Go to the next page




Copyright IBM Corporation 1990, 2014