๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

ABCs of z/OS System Programming

โœ Scribed by Paul Rogers, Alvaro Salla


Publisher
IBM Corporation
Year
2014
Tongue
English
Leaves
286
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Table of Contents


Go to the current abstract on ibm.com/redbooks http://www.redbooks.ibm.com/abstracts/sg246986.html?Open&pdfbookmarkFront cover
Contents
Notices
Trademarks
Preface
Authors
Now you can become a published author, too!
Comments welcome
Stay connected to IBM Redbooks
Chapter 1. Introduction to IBM z/OS security
1.1 z/OS basic security facilities
1.2 z/OS Security Server components
1.3 Integrated Security Services
1.4 Cryptographic Services
1.5 Security Level 3
1.6 IBM Tivoli Directory Server for z/OS
Chapter 2. System Authorization Facility
2.1 SAF overview
2.2 SAF in detail
Chapter 3. IBM z/OS Security Server RACF
3.1 What is RACF?
3.2 RACF functions
3.3 RACF ISPF panel
3.4 RACF profiles
3.5 RACF commands
3.6 User authentication
3.7 Resource managers
3.8 RACF classes
3.9 Security administration with RACF
3.10 RACF user identification and verification
3.11 RACF user profile
3.12 RACF user attributes
3.13 RACF user segments
3.14 RACF user ID and password
3.15 Adding a new user to RACF
3.16 Reset a user password
3.17 Alter a user ID
3.18 Change a user password interval
3.19 Delete a user ID
3.20 User-related RACF commands
3.21 RACF groups
3.22 RACF group structure example
3.23 RACF group-related commands: Add a group
3.24 RACF group-related commands: Alter a group
3.25 RACF group-related commands: Delete a group
3.26 Connect a user to a group
3.27 Remove a user from a group
3.28 Data sets and general resources
3.29 More on profiles for data sets and general resources
3.30 Data set profiles
3.31 Defining data set profiles
3.32 Data set profile access list
3.33 Add a data set profile
3.34 Alter a data set profile
3.35 Search RACF database using a mask
3.36 Data set-related commands
3.37 Data set-related commands, continued
3.38 General resources-related commands
3.39 General resources-related commands, continued
3.40 General resources-related commands, continued
3.41 SET RACF system options
3.42 Statistic-related options
3.43 Password-related options
3.44 Data set-related options
3.45 Class-related options
3.46 Authorization checking-related options
3.47 Tape-related options
3.48 RVARY and other options for initial setup
3.49 RACF and auditing
3.50 Auditor-related options
3.51 SETROPTS: Display options (LIST)
3.52 RACF monitoring
3.53 RACF monitoring, continued
3.54 RACF monitoring, continued
3.55 RACF auditing tools
3.56 RACF auditing - IRRADU00
3.57 RACF auditing: RACF Report Writer
3.58 RACF auditing: DSMON
3.59 RACF auditing: IRRDBU00
3.60 RACF and Dynamic CDT
3.61 RACF and protecting the program
3.62 RACF remote sharing facility
3.63 RRSF nodes and modes
3.64 RRSF: User ID associations
3.65 RRSF: Command direction
3.66 RRSF over TCP/IP
3.67 RACF and interaction with other subsystems
3.68 RACF and digital certificates - the authentication problem
3.69 Overview of digital certificates
3.70 Certificate use in z/OS
3.71 Management of certificates by RACF
Chapter 4. Integrated Security Services
4.1 Introduction to Kerberos
4.2 Kerberos terminology
4.3 Kerberos protocol overview
4.4 Get a ticket-granting ticket
4.5 Request a service ticket
4.6 Authenticate to target server
4.7 Kerberos inter-realm trust relationship
4.8 Some assumptions to Kerberos
4.9 Implementing Network Authentication Service
4.10 Setting up the Kerberos environment variable files
4.11 Setting up HFS for Kerberos cache files
4.12 Kerberos integrated with RACF
4.13 Define Kerberos local principals
4.14 Define Kerberos foreign principals
4.15 Kerberos user commands
4.16 Auditing
4.17 Overview of EIM
4.18 EIM concepts
4.19 Setting up EIM in z/OS
4.20 Installing and configuring EIM on z/OS
4.21 Domain authentication methods
4.22 EIM additional administration tasks
4.23 RACF support for EIM
4.24 Storing LDAP binding information in a profile
4.25 Setting up a registry name for your local RACF registry
4.26 Introduction to Open Cryptographic Enhanced Plug-ins
4.27 How OCEP works with a security server
Chapter 5. Cryptographic Services
5.1 Introduction to cryptography
5.2 Cryptographic capabilities
5.3 Symmetric and asymmetric encryption algorithms
5.4 Symmetric encryption algorithms
5.5 Asymmetric encryption algorithms
5.6 Use of cryptosystems: Data privacy
5.7 Use of cryptosystems: Data integrity
5.8 Use of cryptosystems: Digital signatures
5.9 IBM Common Cryptographic Architecture
5.10 IBM System zEC12: Cryptographic overview
5.11 CP Assist for Cryptographic Functions
5.12 Crypto Express4S feature
5.13 Crypto Express3 feature
5.14 DES key management
5.15 DES encryption
5.16 DES key forms
5.17 Key distribution: Key export
5.18 Key distribution: Key import
5.19 PKA key management
5.20 Integrated Cryptographic Service Facility
Related publications
IBM Redbooks publications
Other publications
How to get IBM Redbooks publications
Back cover


๐Ÿ“œ SIMILAR VOLUMES