z/OS UNIX Security Fundamentals

An IBM Redpaper publication

Note: This is publication is now archived. For reference only.

Published 05 February 2007

cover image

IBM Form #: REDP-4193-00
(148 pages)

More options

Rate and comment

Authors: Chris Rayns, Patrick Kappeler, Finn Christensen, Jean-Marc Darees, Dominique Richard

Abstract

This IBM Redpaper introduces the z/OS UNIX security model and implementation to MVS knowledgeable and security-minded users. It does not address in detail all the wealth of specific security features available in z/OS UNIX, but rather the base principles of operation and the mechanisms implementation with setup recommendations.

We assume that the user already has a knowledge of the most commonly used IBM Resource Access Control Facility (RACF) setups and commands. However, we do not provide detailed procedures and explanations about the use of these commands.

Table of contents

Chapter 1. Overview of the UNIX operating system model
Chapter 2. Overview of z/OS UNIX implementation
Chapter 3. z/OS UNIX users and groups identity management
Chapter 4. z/OS UNIX task identity management
Chapter 5. The z/OS UNIX security model
Chapter 6. z/OS UNIX files security
Chapter 7. Overview of multilevel security
Chapter 8. Considerations on z/OS UNIX program management
Chapter 9. Auditing z/OS UNIX
Appendix A. BPX. RACF profiles
Appendix B. C/C++ functions and UNIX System Services callable services

Follow IBM Redbooks

Follow IBM Redbooks