Previous topic |
Next topic |
Contents |
Glossary |
Contact z/OS |
PDF
A brief comparison of z/OS and UNIX z/OS concepts |
|||||||||||||||||||||||||||||||||||||||||||
What would we find if we compared z/OS® and UNIX®? In many cases, we'd find that quite a few concepts would be mutually understandable to users of either operating system, despite the differences in terminology. For experienced UNIX users, Mapping UNIX to z/OS terms and concepts provides a small sampling of familiar computing terms and concepts. As a new user of z/OS, many of the z/OS terms will sound unfamiliar to you. As you work through this information center, however, the z/OS meanings will be explained and you will find that many elements of UNIX have analogs in z/OS. A major difference for UNIX users moving to z/OS is the idea that the user is just one of many other users. In moving from a UNIX system to the z/OS environment, users typically ask questions such as "Can I have the root password because I need to do..." or "Would you change this or that and restart the system?" It is important for new z/OS users to understand that potentially thousands of other users are active on the same system, and so the scope of user actions and system restarts in z/OS and z/OS UNIX are carefully controlled to avoid negatively affecting other users and applications. Under z/OS, there does not exist a single root password or root user. User IDs are external to z/OS UNIX System Services. User IDs are maintained in a security database that is shared with both UNIX and non-UNIX functions in the z/OS system, and possibly even shared with other z/OS systems. Typically, some user IDs have root authority, but these remain individual user IDs with individual passwords. Also, some user IDs do not normally have root authority, but can switch to "root" when circumstances require it. Both z/OS and UNIX provide APIs to allow in-memory data to be shared between processes. In z/OS, a user can access another user's address spaces directly through cross-memory services. Similarly, UNIX has the concept of Shared Memory functions, and these can be used on UNIX without special authority. z/OS cross-memory services, however, require the issuing program to have special authority, controlled by the authorized program facility (APF). This method allows efficient and secure access to data owned by others, data owned by the user but stored in another address space for convenience, and for rapid and secure communication with services like transaction managers and database managers.
|
Copyright IBM Corporation 1990, 2010
|