The RACF functions are used to determine if a 3rd party is allowed to access a specific resource.
RACROUTE REQUEST=VERIFY,ENVIR=CREATE RACROUTE REQUEST=AUTH RACROUTE REQUEST=VERIFY,ENVIR=DELETE The process is run as a started task and functions as a server from TCP/IP clients. Database access is also performed, and thatÂ’s the source of several of the other STEPLIBs. On Thu, 21 Apr 2011 15:08:15 -0500, Walt Farrell <[email protected]> wrote: >I would say your first action should be to determine whether there are >alternative RACF functions (or functions that invoke RACF functions) that do >not require authorization. If so, try to use them instead. > >Thus, to start, perhaps you should describe the RACF functions you're using >and need in greater detail. If you can replace them with something else, >that will prove much simpler and safer in the long run, I think > >Also, it would help to know more about how your program runs (STC, or >invoked by a user as a batch job or TSO command or whatever) and why there >are STEPLIBs involved. > >-- >Walt Farrell >IBM STSM, z/OS Security Design > >---------------------------------------------------------------------- >For IBM-MAIN subscribe / signoff / archive access instructions, >send email to [email protected] with the message: GET IBM-MAIN INFO >Search the archives at http://bama.ua.edu/archives/ibm-main.html ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [email protected] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html

