Using RACF with CICS
Course
In High Wycombe
Description
-
Type
Course
-
Location
High wycombe
-
Duration
2 Days
On successful completion of this course, attendees will be able to: describe the necessary requirements to implement a secure RACF CICS environment, administrate RACF to protect CICS regions and their User ids, define RACF General Resource Profiles to protect CICS transactions, resources and internal CICS commands, amend CICS system parameters to invoke RACF security. Suitable for: The course is suitable for all Security Administrators and Systems Programmers responsible for CICS.
Facilities
Location
Start date
Start date
About this course
Attendees should have a clear understanding of z/OS at a conceptual level and have an understanding of RACF that can be gained by attending the courses 'Understanding RACF' and 'RACF Technical Overview'. A familiarity with CICS and a knowledge of TSO/ISPF and JCL is also required.
Reviews
Course programme
On successful completion of this course, attendees will be able to:
- describe the necessary requirements to implement a secure RACF CICS environment
- administrate RACF to protect CICS regions and their User ids
- define RACF General Resource Profiles to protect CICS transactions, resources and internal CICS commands
- amend CICS system parameters to invoke RACF security
- understanding the implications using CICS prefixes
- take advantage of the RACF Class Descriptor Table or the new RACF CDT class to create new CICS regions
- describe how CICS and DB2 security work together.
The course is suitable for all Security Administrators and Systems Programmers responsible for CICS.
Prerequisites
Attendees should have a clear understanding of z/OS at a conceptual level and have an understanding of RACF that can be gained by attending the courses 'Understanding RACF' and 'RACF Technical Overview'. A familiarity with CICS and a knowledge of TSO/ISPF and JCL is also required.
Duration
2 days
Course Code
RACS
Contents
Introduction
Planning for security
CICS SIT parameters
RACF User ids
RACF Transaction Classes
Refreshing RACF CICS security
Protecting the CICS User id
CICS Connection Definitions
Auditing RACF and CICS
Using RACF with CICS