posit .

A

number

specified

for

 

each class indesignthe andclassimplementation of the IBM software produ

descriptor

table

that

identifies

a

set

of Seeflagsalsogeneralthat control-use programming

interface. (GUPI)

RACF

processing

options.

See

the

keyword

 

description

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

profile

.

Data

 

that

 

describes

the

significant

for positOS/390in Security Server (RACF) Macros and

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Interfaces.

 

 

 

 

 

 

 

 

 

 

 

 

characteristics of

a

user,

 

a group of users, or

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

more computer resources. Seedataalseto

 

profile,

 

process .

(1) A

function

being

performed

 

or

waitingdiscreteto profile,general

 

resource

profile,generic

profile,

be

performed.

(2) An

executing

 

function,

 

or

onegroupwaitingprofile,and user

profile.

 

 

 

 

 

 

 

 

to

execute. (3) A

function, createdfork() request,by a

program access to data sets

(PADS) .

A

RACF

 

 

 

 

with

three

logical

sections:

 

 

 

 

 

 

 

 

 

 

Ÿ

Text, which is the function's

instructions

function

that

 

enables

an

authorized

 

user

or

group

users to

access

one

or

more

data

 

sets

at

a spe

Ÿ

Data,

which

the

instructions

 

use

but

do

not

change

 

 

only

while

running

a

 

specified

Ÿ

Stack,

which

is

a

push-down,

 

pop-up

save

access

authority

 

 

area

of

 

program.

See

programalso

control.

 

 

 

the dynamic data that the

 

function

 

 

RACF-controlled

 

 

 

 

operates

upon

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

The

three

types

of

processes

are:

 

 

 

program

control

 

.

A

RACF

function

that

enables

an

Ÿ

User

processes,

which

are

associated

installation

to

control

who

can

 

run

RACF-controlled

with

a

user

at

 

 

access

 

to

data.

sets

 

 

a

workstation

 

 

 

 

 

 

 

 

 

 

 

programs.

See

alsoprogram

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Ÿ

Daemon

processes,

which

do

 

systemwide

functions

Seeproduct-sensitive

programming

interface.

 

in

user

mode,

such

as

printer

spooling

PSPI

.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

ŸKernel processes, which do systemwide functions in

 

kernel

mode,

 

such

 

as

paging

 

 

 

 

 

 

 

 

 

R

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

A

process

can

 

run

in

an

OpenEdition

user

address

 

See

Resource

Access

Control Facility.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

RACF .

 

 

space, an OpenEdition forked address space, or an

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

OpenEdition

kernel

address

space.

In

an

MVS

 

 

system,

 

 

.

 

A

collection

of

 

interrelated

or

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

RACF

database

 

 

 

 

a

process

is

handled

like

a

taskk. (4)SeeAn also independent

data items stored together without

address

space

 

and

one or

more

threads

of

 

 

control

that

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

execute

within

 

that

 

address

space

and

 

 

 

unnecessary redundancy to serve Resource Access

 

 

their required

 

(RACF).

 

 

 

 

 

 

 

 

 

 

 

 

system

resources.

(5) An

address

space

and

 

 

Control

Facility

 

 

 

 

 

 

 

 

 

 

 

 

 

 

single

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

thread

of

control

that

executes

within

that

 

address

 

 

facility

(RRSF)

 

 

.

 

RACF

 

 

 

 

 

 

space

and

its

 

required

system

resources.

 

 

RACF

remote

sharing

 

 

 

 

 

 

 

 

 

 

 

A

process

is

 

function

within

the

RACF

subsystem

created

by

another

 

process fork()issuingfunctionthe .

 

 

services

 

that

 

 

 

 

address

space

to

provide

network

capabilities

to

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

The process that issuesfork() is known as the parent

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

process,

and

the

new

 

process

createdfork()

isby

 

the

remove

ID

utility .

A

RACF

utility

which

 

 

 

known as

the

child process.

(6) A

sequence

 

 

RACF

 

 

 

of

actions

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

required

to

produce

a

desired

 

result.

 

 

 

identifies references to user IDs and group IDs

 

(7) An

entity

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

receiving

a

portion

of

the

processor's

time

 

RACF database. The utility can be used to find

 

 

for

 

executing

residual

user

IDs

and

group

IDs

a

program.

(8) An

activity

within

the

system

 

 

references

to

 

that

 

is

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

started

by

a

 

command,

a

shell

program,

or

 

 

specified user IDs and group IDs. The output f

 

another

is

a

set

of

RACF

commands

that

can

be

use

process.

Any

running

program

is

a

 

 

 

 

 

 

 

 

utility

 

process. (9) A

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

unique,

finite

 

course

 

of

events

 

defined

by

remove the references from the RACF database aft

 

 

 

 

its

purpose

or

 

 

 

 

 

 

 

 

 

 

 

 

 

 

by its effect, achieved under

 

given

 

 

 

 

 

review and

possible modification by the customer.

 

 

conditions.

(10) Any

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

operation

or

combination

of

operations

on

data.

report

writer

 

.

A

RACF

function

that

produces

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

RACF

 

 

(11) The

current

state

of

a

program

that

is

 

 

on

system

use

and

resource

use

from

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

reports

 

running—including

a

memory

image,

the

program

data,

 

 

found in

the

RACF

SMF

 

records.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

information

 

 

 

 

the variables used, the general register values, the

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

status of opened files used, and the currentRACF

SMFdirectorydata unload. utility

 

.

 

A

RACF

utility

that

 

 

Programs running in a process must

 

be

either enablesoperatinginstallations

to

create a sequential file f

system programs or user programs.

(12) A runningsecurity relevant audit data. The sequential file

program

including

the

 

memory

occupied,

the

openusedfiles,in several ways:

viewed

directly,

 

used

as i

the environment, and other attributes specificinstallationto

-written

programs,

and

 

manipulated

with

 

running

program.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

sort/merge utilities. It can also be uploaded to

product-sensitive programming interface (PSPI)

 

 

 

 

.

 

A

 

 

 

database manager (for example, DB2) to process

 

 

 

 

 

 

 

 

complex inquiries and create installation-tailored rep

programming interface intended to be used only for

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

specialized tasks such as: diagnosis, modification,RACF-protected

 

 

.

 

Pertaining

to

a

 

resource

that

has

monitoring,

 

repairing,

tailoring,

and

tuning of eitherIBMa discrete profile, an applicable generic

software product and that depends on or

requiresa file theor

directory

that doesn't have a profile,

customer

to

understand

significant

aspects

ofprotectedthe

 

with

the

File

Security

Packet (FSP). A da

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Glossary

 

43

 

 

 

Page 63
Image 63
IBM OS/390 manual Posit, Process, Pads, Utility

OS/390 specifications

IBM OS/390, a versatile operating system, was a cornerstone in enterprise environments and played a pivotal role in mainframe computing. Released in the mid-1990s, OS/390 combined the strengths of IBM's MVS (Multiple Virtual Storage) with new features and enhancements, targeting scalability, reliability, and performance in demanding business applications.

One of the key features of OS/390 was its robust support for multiple users and processes. The system allowed thousands of concurrent users to access applications and data, ensuring high availability and minimizing downtime—a critical requirement for many large organizations. This scalability was supported through various enhancements in memory management and processor scheduling, enabling optimal resource allocation across diverse workloads.

OS/390 was known for its superior workload management capabilities. The Workload Manager (WLM) component allowed administrators to define service policies, specifying how system resources would be allocated according to the priority of tasks. This ensured that critical business processes received the necessary resources while less critical tasks were managed more flexibly.

Another significant characteristic of OS/390 was its commitment to security. The operating system provided comprehensive security features, including user authentication, data encryption, and auditing capabilities. This focus on security was vital for organizations handling sensitive data, ensuring compliance with regulations and safeguarding against unauthorized access.

OS/390 also supported advanced technologies that facilitated integration and development. The system included features like the IBM CICS (Customer Information Control System) for transaction processing and IMS (Information Management System) for database management. These technologies allowed organizations to build robust, high-performance applications tailored to specific business needs.

The ease of network integration was another strength of OS/390. With the advent of the Internet and global connectivity, OS/390 systems could easily interface with various network protocols, enabling businesses to operate in a connected world. This inclusion paved the way for many organizations to expand their capabilities and offer new services, driving digital transformation.

In conclusion, IBM OS/390 represented a significant advancement in mainframe technology, combining scalability, security, and robust workload management. Its rich feature set and support for critical enterprise applications solidified its role as a vital component of many organizations' IT infrastructures, ensuring they could meet their operational challenges head-on while supporting future growth. As technology continues to evolve, the legacy of OS/390 remains influential in the realm of computing.