Previous topic |
Next topic |
Contents |
Contact z/OS |
Library |
PDF
Security labels z/OS Security Server RACF Security Administrator's Guide SA23-2289-00 |
|
Security label authorization checking is dependent on the concept
of controlling user access to resources on the basis of three factors:
The security administrator indicates the sensitivity of the data in the resource as well as the authorization of the user by assigning appropriate security labels in the resource or user profile. Security label authorization checking involves comparing the user's security label with the security label of the resource. A user who lacks sufficient authorization is prevented from accessing information in the resource. Three requested access levels are supported for security label
authorization checking:
|
Copyright IBM Corporation 1990, 2014
|