Previous topic |
Next topic |
Contents |
Contact z/OS |
Library |
PDF
Protecting terminals z/OS Security Server RACF Security Administrator's Guide SA23-2289-00 |
|
There are several methods of controlling the use of terminals that
are connected to your system. The following sections describe these
methods:
For a description of authorization checking for terminals, see Authorizing access to RACF-protected terminals. |
Copyright IBM Corporation 1990, 2014
|