Security

There’s an old adage: You can’t manage what you don’t name. Then there’s its corollary: You can’t manage well what you don’t explicitly define. Done right, a well-writt en project or program description will help guide all participants toward your goals. Done wrong, this definition will set false expectations and send participants down the wrong path. As a leader, you should review the official descriptions of efforts for which you’re responsible…

Read Full Article →

Converting To & From RACF Universal Groups

With RACF for z/OS 1.2, IBM introduced the RACF UNIVERSAL group. What differentiates a RACF UNIVERSAL group from a standard RACF group? A RACF UNIVERSAL group can have an unlimited number of AUTH(USE) userids connected to it, provided the AUTH(USE) userids don’t have GROUP-AUDITOR, GROUP-OPERATIONS, or GROUP-SPECIAL privileges. Since RACF maintains the group connect information for a userid with AUTH(USE) authority connected to a UNIVERSAL group only in the userid data, there’s no limit to the number of userids with AUTH(USE) authority that can be connected to a UNIVERSAL group…

Read Full Article →

IMS Version 9 (V9) was the last release of IMS to support the Security Maintenance Utility (SMU). New facilities were introduced with that release so SMU usage can be replaced with any security product that uses the System Authorization Facility (SAF). Customers can migrate to RACF equivalent security while they’re still using IMS V9; however, they must migrate to RACF equivalent security before migrating to IMS 10…

Read Full Article →

IT organizations are under increasing pressure to ensure compliance with regulatory mandates and the imperatives of good corporate governance. This is no easy task. The compliance alphabet soup can significantly tax a company’s resources, perpetually forcing them to balance the need to mitigate risk against the need to allocate resources elsewhere…

Read Full Article →

This article is intended to provide just enough background, information, and tutelage to get a programmer interested in testing the waters in the world of cryptography. Linux on System z applications provide the perfect playground, with the ease of programming in the Linux environment and the security available in the System z hardware. Because the world is changing and data encryption is a hot topic, a crypto 101 project is desperately needed…

Read Full Article →