IBM OS/390 manual IBM Systems Center Publications

Page 15

RACF Courses

The

following

RACF

classroom courses are also available:

Ÿ

Effective

RACF

Administration,H3927

Ÿ

MVS/ESA RACF

Security Topics, H3918

ŸImplementing RACF Security for CICS/ESA,H3992

IBM provides a variety of educational offerings for RACF. For more i classroom courses and other offerings, see your IBMBM representative, Mainframe Training Solutions, GR28-5467, or call 1-800-IBM-TEACH

(1-800-426-8322).

IBM Systems Center Publications

IBM systems centers produce “red” and “orange” books that can be setting up and using RACF.

These books have not been subjected to any formal review nor have checked for technical accuracy, but they represent current product (at the time of their publication) and provide valuable information on

 

of RACF topics. They are not shipped with RACF. You must order them

 

separately. A

selected list of these books follows:

 

Ÿ

Systems Security Publications Bibliography,G320-9279

 

 

Ÿ

Elements of Security: RACF Overview - StudentGG24Notes,-3970

 

Ÿ

Elements of Security: RACF Installation - StudentGG24-3971Notes,

 

Ÿ

Elements

of

Security:

RACF Advanced Topics -

StudentGG24-Notes,3972

 

Ÿ

RACF

Version

2

Release

2

Technical PresentationGG24-2539Guide,

 

Ÿ

RACF

Version

2

Release

2

Installation

and

ImplementationSG24-4580Guide,

 

Ÿ

Enhanced

Auditing

Using

the

RACF SMF Data UnloadGG24Utility,-4453

 

Ÿ

RACF

Macros

and Exit Coding,GG24-3984

 

 

 

Ÿ

RACF

Support

for Open Systems Technical PresentationGG26Guide,-2005

 

Ÿ

DFSMS

and

RACF

Usage Considerations,GG24-3378

 

 

Ÿ Introduction

to System and Network Security: Considerations, Options,

 

 

Techniques, GG24-3451

 

 

 

 

 

 

Ÿ

Network Security Involving the NetView Family ofGG24Products,-3524

 

Ÿ

System/390 MVS Sysplex Hardware and Software Migration,GC28-1210

 

Ÿ

Secured Single Signon in a Client/Server Environment,GG24-4282

 

Ÿ

Tutorial: Options for Tuning GG22RACF, -9396

 

 

Ÿ

OS/390 Security

Server

Audit

Tool and

Report,

SG24Application-4820

Other books are available, but they are not included in this list, information they present has been incorporated into IBM product manual because their technical content is outdated.

About This Book xiii

Image 15
Contents IBM Page IBM IBM Fourth Edition, SeptemberContents Index RacfConsiderations GetRacf PspiPage IBM USAUSA Page Trademarks Page Book How to Use ThisAbout This Book Who Should Use This BookOS/390 Collection Where to Find More InformationOS/390 Security Server Racf Information , PackageSK2T-2180 Server Racf Information , Package seeIBM Systems Center Publications Sample code Other Sources of InformationSecurity Racf home RACF-L discussion listPublications FtpFTP Servers Page OS/390 Version PresentedRACF Planning inInstallationPage Migration Migration Planning ConsiderationsPSP Installation ConsiderationsAdministration Considerations Customization ConsiderationsData Areas OS/390 Security Server Auditing ConsiderationsApplication Development Considerations General User ConsiderationsPage New and Enhanced Support Release OverviewUID Enhancements to Support for OpenEdition ServicesGggg needs Run-Time Library ServicesPassword History Enhancements GIDALL ProgramOW24966 Enhancements to New FmidOW26237 Enhancements Enable/Disable ChangesAccess GuideSYS1.SAMPLIB Callable ServicesNew Callable Services ReleaseClass Descriptor Table CDT GIDUID Command Language Reference CommandsNoclauth PermitParmlib Data Areas Exits ICHRFX03ICHRFX04 Changed Messages MacrosMessages New MessagesPanels Deleted MessagesMember ICHP241CICHP242A ICHH241CData Areas This No longer Licensed Publication Its New Form Publications LibraryChanges to the Racf Publications Library OS/390 Security ServerMigration Strategy Planning ConsiderationsRacf Migration and Planning for Racf 1.9.2GC23-3045 Hardware RequirementsRELEASE=2.4 Keyword on CompatibilityOpenEdition MVS Program Control by System IDPage Racf Estimated Storage Usage Installation ConsiderationsRacf Storage Considerations Virtual StorageHow ICB System Programmers GuidePage RACF/DB2 Customization ConsiderationsCustomer Additions to the Router Table and the CDT RACF/DB2 External Security Module CustomizationOS/390 Security Server Racf System Programmers. Guide Administration Guide Volume , SC26For OS/390 Version Installation Exit ProcessingServer Racf Security Administrators. Guide Administration ConsiderationsTmeadmin Class Password History ChangesRacroute REQUEST=LIST Enhancements of Global Access CheckingSysid Auditing ConsiderationsSMF Records Auditors GuidePage Racroute Icheinty Application Development ConsiderationsProgramming Interfaces Fastauth ChangesPage Security Server Racf General Users. Guide General User ConsiderationsPage Audit UpdateGlossary MVSDirectory DirectionFacility DataHFS EntityGID FileUnit PasswordRequest NodeUtility PositProcess PadsRoot ClassificationVerifyx File SystemSyscall Target NodeTask Sets VerificationName ProfileCics TSO/E How to Get Your Racf CDPage See IndexSee alsoexits IRR@XACS 19 Ispf panels LsqaPlpa Smfid SMF80DTASee alsoRRSF router table RaclistPage Readers Comments Wed Like to Hear from You Readers Comments Wed Like to Hear from You IBMPage IBM
Related manuals
Manual 673 pages 53.75 Kb

OS/390 specifications

IBM OS/390, a versatile operating system, was a cornerstone in enterprise environments and played a pivotal role in mainframe computing. Released in the mid-1990s, OS/390 combined the strengths of IBM's MVS (Multiple Virtual Storage) with new features and enhancements, targeting scalability, reliability, and performance in demanding business applications.

One of the key features of OS/390 was its robust support for multiple users and processes. The system allowed thousands of concurrent users to access applications and data, ensuring high availability and minimizing downtime—a critical requirement for many large organizations. This scalability was supported through various enhancements in memory management and processor scheduling, enabling optimal resource allocation across diverse workloads.

OS/390 was known for its superior workload management capabilities. The Workload Manager (WLM) component allowed administrators to define service policies, specifying how system resources would be allocated according to the priority of tasks. This ensured that critical business processes received the necessary resources while less critical tasks were managed more flexibly.

Another significant characteristic of OS/390 was its commitment to security. The operating system provided comprehensive security features, including user authentication, data encryption, and auditing capabilities. This focus on security was vital for organizations handling sensitive data, ensuring compliance with regulations and safeguarding against unauthorized access.

OS/390 also supported advanced technologies that facilitated integration and development. The system included features like the IBM CICS (Customer Information Control System) for transaction processing and IMS (Information Management System) for database management. These technologies allowed organizations to build robust, high-performance applications tailored to specific business needs.

The ease of network integration was another strength of OS/390. With the advent of the Internet and global connectivity, OS/390 systems could easily interface with various network protocols, enabling businesses to operate in a connected world. This inclusion paved the way for many organizations to expand their capabilities and offer new services, driving digital transformation.

In conclusion, IBM OS/390 represented a significant advancement in mainframe technology, combining scalability, security, and robust workload management. Its rich feature set and support for critical enterprise applications solidified its role as a vital component of many organizations' IT infrastructures, ensuring they could meet their operational challenges head-on while supporting future growth. As technology continues to evolve, the legacy of OS/390 remains influential in the realm of computing.