This course teaches you how to implement the new facilities available in RACF. Over one-half of the class time is devoted to the RACF Remote Sharing Facility (RRSF). Through a combination of classroom lecture and hands-on lab exercises, you will learn how to establish an RRSF environment, including using RRSF facilities to administer security of remote RACF databases from a single centralized location, allowing users to synchronize password changes among several associated userids, using RRSF facilities to automatically maintain synchronization of two or more separate RACF databases, and setting up RACF security for APPC/MVS, which is used to communicate with other RACF/MVS systems in the RRSF environment. Other major functions that you will study include RACF Sysplex Data Sharing and Sysplex Communication, the RACF Remove ID Utility, RACLIST enhancements, RACF support for OpenEdition MVS, and DB2 security using RACF.
IACET Continuing Education Units: 2.8
This intermediate course is for security personnel and RACF support personnel responsible for implementing RACF, administering RACF, or both.
Explain the features and benefits of the various advanced functions in RACF
Identify any migration considerations associated with these functions
List the tasks that must be performed to implement the advanced security features, and develop an implementation plan
Make the definitions in RACF to implement the advanced security functions
You should have:
RACF administration skills (obtained by attending Effective RACF Administration BE87 or Basics of z/OS RACF Administration ES19 ), or equivalent experience.
Unit 1 - Introduction to RRSF Exercises 1-4
Exercise 1 - Defining RRSF nodes
Exercise 2 - Directed commands and password and passphrase synchronization
Exercise 3 - Remote administration
Exercise 4 - Automatic command and password direction
Exercises 1-4 review
Unit 2 - RACF sysplex support Unit 3 - RACF security for DB2
Exercise 5 - Operator command security Unit 4 - Command and console security
Unit 5 - RACF support for z/OS UNIX
Exercise 6 - Add a z/OS UNIX user
Exercise 7 - Using the z/OS UNIX shell
Exercise 8 - Using the USS ISPF shell and ISPF 3.17 Udlist function
Exercise 9 - Access control lists (ACLs)
Exercises 6-9 review
Unit 6 - Controlling network job entry
Unit 7 - Backup and recovery of the RACF database Unit 8 - Program control
If you need training for 3 or more people, you should ask us about onsite training. Putting aside the obvious location benefit, content can be customised to better meet your business objectives and more can be covered than in a public classroom. It's a cost effective option.
Submit an enquiry from any page on this site, and let us know you are interested in the requirements box, or simply mention it when we contact you.