z/OS UNIX Security Fundamentals

An IBM Redpaper publication

Note: This is publication is now archived. For reference only.

thumbnail 

Published on February 05, 2007

  1. .PDF (1.9 MB)

Share this page:   

IBM Form #: REDP-4193-00


Authors: Chris Rayns, Patrick Kappeler, Finn Christensen, Jean-Marc Darees and Dominique Richard

    menu icon

    Abstract

    This IBM Redpaper introduces the z/OS UNIX security model and implementation to MVS knowledgeable and security-minded users. It does not address in detail all the wealth of specific security features available in z/OS UNIX, but rather the base principles of operation and the mechanisms implementation with setup recommendations.

    We assume that the user already has a knowledge of the most commonly used IBM Resource Access Control Facility (RACF) setups and commands. However, we do not provide detailed procedures and explanations about the use of these commands.

    Table of Contents

    Chapter 1. Overview of the UNIX operating system model

    Chapter 2. Overview of z/OS UNIX implementation

    Chapter 3. z/OS UNIX users and groups identity management

    Chapter 4. z/OS UNIX task identity management

    Chapter 5. The z/OS UNIX security model

    Chapter 6. z/OS UNIX files security

    Chapter 7. Overview of multilevel security

    Chapter 8. Considerations on z/OS UNIX program management

    Chapter 9. Auditing z/OS UNIX

    Appendix A. BPX. RACF profiles

    Appendix B. C/C++ functions and UNIX System Services callable services

     

    Others who read this also read