z/OS Security Server RACF General User's Guide
Previous topic | Next topic | Contents | Contact z/OS | Library | PDF


Denying an individual or a group use of a data set

z/OS Security Server RACF General User's Guide
SA23-2298-00

You can use a data set profile to protect the information in your data sets. You might want to deny an individual use of a data set. For example, a colleague who has left the department can still use a data set. For security reasons you wish to exclude the person from using the data set. You can deny anyone access to your data set by specifying a certain universal access or individual access authority.

Note: For a description of when a change to a user's access occurs, see When data set profile changes take effect.

To deny an individual or a group use of a data set:

  1. Find the name of the profile that protects the data set. To do this, see Finding out how a data set is protected.
  2. Decide whether to use the profile that protects the data set.
    • If the profile is a discrete profile, go on to Step 3.
    • If the profile is a generic profile, it might protect more than one data set. You need to decide whether to create a new profile for the data set. For more information, see Choosing between discrete and generic profiles.
  3. Use the PERMIT command to deny access to the data set.
    You can use the PERMIT command to do this in two ways:
    • One way to deny access is to include the user or group on the access list but assign the user or group an access of NONE. To assign an access of NONE is the best procedure to ensure that the user or group has no access to the data set. See Including the individual or group on the access list with ACCESS(NONE).
    • The second way is to remove the name of the user or group from the access list. However, this denies access only if the UACC is NONE. For example, if you delete a user or group from the access list but the UACC is READ or higher, the user or group can still access the data set. See Removing the user or group from the access list.

Go to the previous page Go to the next page




Copyright IBM Corporation 1990, 2014