The RACF functions are used to determine if a 3rd party is allowed to access a 
specific resource.

RACROUTE REQUEST=VERIFY,ENVIR=CREATE
RACROUTE REQUEST=AUTH
RACROUTE REQUEST=VERIFY,ENVIR=DELETE

The process is run as a started task and functions as a server from TCP/IP 
clients.  Database access is also performed, and thatÂ’s the source of several 
of the other STEPLIBs.


On Thu, 21 Apr 2011 15:08:15 -0500, Walt Farrell <[email protected]> 
wrote:

>I would say your first action should be to determine whether there are
>alternative RACF functions (or functions that invoke RACF functions) that do
>not require authorization. If so, try to use them instead.
>
>Thus, to start, perhaps you should describe the RACF functions you're using
>and need in greater detail. If you can replace them with something else,
>that will prove much simpler and safer in the long run, I think
>
>Also, it would help to know more about how your program runs (STC, or
>invoked by a user as a batch job or TSO command or whatever) and why 
there
>are STEPLIBs involved.
>
>--
>Walt Farrell
>IBM STSM, z/OS Security Design
>
>----------------------------------------------------------------------
>For IBM-MAIN subscribe / signoff / archive access instructions,
>send email to [email protected] with the message: GET IBM-MAIN INFO
>Search the archives at http://bama.ua.edu/archives/ibm-main.html

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to