My Account Log in

1 option

IBM z/OS V2R2 : security / Keith Winnard [and three others].

O'Reilly Online Learning: Academic/Public Library Edition Available online

View online
Format:
Book
Author/Creator:
Winnard, Keith, author.
Biondo, Jose Gilberto, author.
Figueiredo, Wilson de, author.
Hering, Paul-Robert, author.
Contributor:
International Business Machines Corporation. International Technical Support Organization.
Series:
IBM redbooks.
IBM redbooks
Language:
English
Subjects (All):
z/OS.
Computer networks--Security measures.
Computer networks.
Database management.
Physical Description:
1 online resource (1 volume) : illustrations.
Edition:
First edition.
Place of Publication:
Poughkeepsie, NY : IBM Corporation, International Technical Support Organization, 2015.
System Details:
text file
Summary:
This IBM® Redbooks® publication helps you to become familiar with the technical changes that were introduced to the security areas with IBM z/OS® V2R2. The following chapters are included: - Chapter 1, “RACF updates” on page 1: In this chapter, we describe the read-only auditor attribute, password security enhancements, RACDCERT (granular certificate administration), UNIX search authority, and RACF Remote sharing facility (RRSF). - Chapter 2, “LDAP updates” on page 13: In this chapter, we describe the activity log enhancements, compatibility level upgrade without LDAP outage, dynamic group performance enhancements, and replication of password policy attributes from a read-only replica. - Chapter 3, “PKI updates” on page 21: In this chapter, we describe the Network Authentication Service (KERBEROS) PKINIT, PKI nxm authorization, PKI OCSP enhancement, and RACDCERT (granular certificate administration) - Chapter 4, “z/OS UNIX search and file execution authority” on page 27: z/OS UNIX search authority, z/OS UNIX file execution, Examples for exploiting the new functions This book is one of a series of IBM Redbooks that take a modular approach to providing information about the updates that are included with z/OS V2R2. This approach has the following goals: - Provide modular content - Group the technical changes into a topic - Provide a more streamlined way of finding relevant information that is based on the topic We hope you find this approach useful and we welcome your feedback.
Notes:
Description based on online resource; title from cover page (Safari, viewed January 22, 2016).
Number on resource description page: SG24828800.
"Security, z Systems."
Includes bibliographical references.
OCLC:
935744725

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

Find

Home Release notes

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Find catalog Using Articles+ Using your account