Seminarinhalt
Objective
- Identify the security requirements of a system
- Evaluate the facilities and options of RACF
- Define users to RACF
- Set up a RACF group structure
- Use RACF to protect resources
- Select options to tailor RACF
- Evaluate and implement RACF database and performance options
- Identify tools available for auditing
- Administer the system so that it is consistent with the installation's security goals
Programm
- Welcome
- Unit 1 - Security and RACF overview
- Unit 2 - Administering groups and users
- Exercise 1 - Log on to the lab system
- Exercise 2 - Defining a RACF group structure
- Exercise 3 - User administration
Day 2
- Exercise review
- Unit 2 - Administering groups and users (continued)
- Exercise 4 - Delegating security administration
- Unit 3 - Protecting z/OS data sets
- Exercise 5 - Protecting z/OS data sets: Part 1
Day 3
- Exercise 5 - Protecting z/OS data sets: Part 1 (continued)
- Exercise 6 - Protecting z/OS data sets: Part 2 Exercise review
- Unit 4 - Introduction to user administration and delegation and general resources
- Exercise 7 - Password reset granularity
- Unit 5 - RACF database, tables, and performance options
Day 4
- Unit 6 - RACF utilities and exits
- Unit 7 - RACF options
- Unit 8 - Auditing the RACF environment
- Exercise 8 - Using RACF for TSO administration (Optional)
- Exercise 9 - RACF utilities (Optional)
- Exercise 10 - RACF monitoring
Day 5
- Exercise review
- Unit 9 - Storage management and RACF
- Unit 10 - Security for JES facilities
- Unit 11 - Security classification
Zielgruppen
Anyone planning to implement the advanced features of RACF should consider attending Implementing RACF Security for CICS (ES84), and Exploiting the Advanced Features of RACF (ES88)
Vorkenntnisse
You might also find it beneficial to attend z/OS Security Server RACF, Implementation and Customization (SZ81) to learn the implementation and customization of the z/OS security server RACF.