Stack recognition of a multilevel secure environment

You can activate the SAF SECLABEL class and define security labels on SERVAUTH profiles. This causes the security server to enforce mandatory access control policies for those resources without fully activating a multilevel secure environment. The z/OS® Communications Server stack does not perform its extra mandatory access control policy enforcement until you issue the RACF® command SETROPTS MLACTIVE. When running with SETROPTS NOMLACTIVE, you should not use unrestricted stacks or define network security zones with a SYSMULTI security label.

When a NetAccess statement is encountered in TCPIP profile processing and MLACTIVE has been set, the stack activates extra mandatory access control policy enforcement in both restricted and unrestricted stacks as follows: