z/OS ISPF Software Configuration and Library Manager Guide and Reference
Previous topic | Next topic | Contents | Contact z/OS | Library | PDF


SCLM security

z/OS ISPF Software Configuration and Library Manager Guide and Reference
SC19-3625-00

This chapter discusses the methods that can be used to secure your SCLM environment.

Table 1 shows a summary of these methods.

Table 1. Summary of methods to secure an SCLM environment
Type of SCLM security Methods How it works Comments
Securing the SCLM data sets Enhanced Access Control (EAC)1. EAC ensures data sets can only be accessed within SCLM. External 3rd party product.
RACF® or alternate security product2. Limits access to data sets to certain users. Will not stop users accessing SCLM data sets outside of SCLM.
SCLM project/alternate based access to data sets using XFACILIT resources4. XFACILIT resources limit what data sets can be used by an SCLM project/alternate. SCLM internal security features.
Securing members within SCLM SCLM subproject security using XFACILIT resources4. SCLM allows members to be associated with subproject. XFACILIT resources can be used to define user access to the subprojects. SCLM internal security features.
Encoding SCLM members Internal SCLM process used to encode/decode SCLM members3. SCLM allows members to be encoded such that they are not viewable outside of SCLM. SCLM internal security features.
Securing SCLM dialogs and services Enhanced Access Control (EAC)1. EAC can be used to secure users access to the SCLM online dialog functionality and SCLM services. External 3rd party product.
SCLM dialog/service security using XFACILIT resources4. XFACILIT resources can be used to secure users access to the SCLM online dialog functionality and SCLM services. SCLM internal security features.
Note:
  1. Enhanced Access Control is a 3rd Party Product available through IBM® which is external to SCLM and is not discussed in this chapter. For more information, refer to the EAC documentation.
  2. To secure data sets using RACF or an alternate security product, see your security administrator or refer to the relevant security documentation.
  3. To determine how to encode SCLM members, see Member encoding and decoding.
  4. The SCLM internal security features are discussed in further detail in the remainder of this chapter.

Go to the previous page Go to the next page




Copyright IBM Corporation 1990, 2014