For security administrators and technician working with RACF in a CICS/System z environment, this course will be very useful. The course is designed, written and presented by specialist RACF consultants. It provides a detailed insight into the CICS-RACF Interface. The course describes and explains how RACF is implemented within a CICS environment.
This course is also available for one-company, exclusive presentations, either run on-site or via the Virtual Classroom Environment service.
Attendees should have a clear understanding of z/OS at a conceptual level and have an understanding of RACF that can be gained by attending the courses Understanding RACF and RACF Technical Overview. A familiarity with CICS and a knowledge of TSO/ISPF and JCL is also required.
The CICS family; Today's CICS; Product Identifiers; What is CICS?; Terminology; CICS tables; What is a Business Transaction?; What is a CICS task /CICS transaction?; What is a CICS program?; CICS characteristics; On-line processing; IBM CICS Transaction Server for z/OS; Workload management; Access to CICS; Accessing CICS from the Web; CICS Web Support (CWS); CICS Web Services; CICS Web Services support; The IBM client family; IBM CICS® Transaction Gateway, Version 7.0; XML support; CICS organisation; Application services; Principal Domains/Management modules; CICS resource definitions; RDO overview; RDO components; The CICS System Definition File; The CICS Global Catalog; Available documentation (RACF related).
What is required of a security system?; IBM's Resource Access Control Facility (RACF); Main RACF/MVS components; How does RACF work?; RACF Profiles; User Profiles; Group Profiles; Resource Profiles; RACF classes; Always present; IBM-supplied general resource classes; Controlling access; Allowing access; RACF commands.
CICS & RACF
The CICS-RACF interface; The role of CICS in security control; Region-wide requirements; Interface implementation; CICS-RACF interfaces.
CICS & RACF in a Single CICS Region
CICS & RACF in a single CICS region; CICS region userid; Creating the CICS region userids; CICS default userid; Access requirements.
Overview; Types of connections; Intercommunication security; BIND security; Link security; User security.
Setting up CICS RACF Security
Setting up CICS RACF security; CICS SIT parameters; SIT parameters: typical configuration; Protect the CICS region; User access from a terminal; User signon; Controlling userid propagation; PROPCNTL; Surrogat; Member or grouping class?; Example of member class profiles; Example of grouping class profiles; How RACF merges profiles; Who has access to STOH?; Setting up CICS RACF security.
Join our public courses in our Istanbul, London and Ankara facilities. Private class trainings will be organized at the location of your preference, according to your schedule.