What is RACF and ACF2?
RACF is an add-on software product that provides basic security for a mainframe system (examples of other security software packages include ACF2 and Top Secret, both from Computer Associates). RACF protects resources by granting access only to authorized users of the protected resources.
What is CA ACF2 in mainframe?
ACF2 (more formally, CA-ACF2; the ACF stands for Access Control Facility) is a set of programs from Computer Associates that enable security on mainframes. ACF2 prevents accidental or deliberate modification, corruption, mutilation, deletion, or viral infection of files.
What is RACF ID in mainframe?
A RACF (Resource Access Control Facility) ID (identifier) is the ID used to access the Judicial Information System (JIS) Mainframe and Web applications and the Inside Courts Web site. Your individual CJE records are only available to you via your RACF ID and password.
What is RACF database?
The RACF® database holds all RACF access-control information. RACF processing uses the information from the database: Each time a RACF-defined user enters a system. Each time a user wants to access a RACF-protected resource.
What is the full form of RACF?
RACF, [pronounced Rack-Eff] short for Resource Access Control Facility, is an IBM software product. It is a security system that provides access control and auditing functionality for the z/OS and z/VM operating systems.
What does RACF stand for in aged care?
When you are no longer able to live comfortably and safely in your own home, you may move into a residential aged care facility (RACF) where you have more support available.
What is CA Top Secret?
CA Top Secret provides comprehensive security for your valuable information assets, enabling your business to fully realize the reliability, scalability and cost-effectiveness of the mainframe.
What is RACF password?
RACF has the following rules for passwords: The length can be 1 to 8 characters. Valid characters are alphabetic uppercase (A–Z), numeric (0–9), and national (# (X’7B’), @ (X’7C’), and $ (X’5B’)). If your installation supports mixed case passwords, alphabetic lowercase characters (a-z) are also accepted in passwords.
How old is RACF?
RACF was introduced in 1976. Originally called RACF it was renamed to z/OS Security Server (RACF) although most mainframe folks still refer to it as RACF. Its main features are: Identification and verification of a user via user id and password check (authentication)
What is a RACF ID CMS?
If you have submitted a request for a role in an application where a CMS 4-character Resource Access Control Facility (RACF) is used for identification and verification, you may have to change your password and create and enter an 8-character password the next time you log in, after your request has been approved.
What does RACF stand for?
Resource Access Control Facility
RACF, [pronounced Rack-Eff] short for Resource Access Control Facility, is an IBM software product. It is a security system that provides access control and auditing functionality for the z/OS and z/VM operating systems. RACF was introduced in 1976.
What is RACF group?
A group is a RACF entity with which any number of users are associated. Usually, the users in a group have some logical relationship to one another. The relationship used most frequently is members of a department. Many installations pattern their group-user structure after their organization charts.
What does RACF stand for in security category?
Resource Access Control Facility or RACF provides the tools to manage user access to critical resources. RACF is an add-on software product that provides basic security for a mainframe system (examples of other security software packages include ACF2 and Top Secret, both from Computer Associates).
Is it possible to migrate from ca-acf2 to RACF?
Planning a migration from CA-ACF2 to the RACF element of the OS/390 Security Server, without unduly disrupting an OS/390 production environment, requires considerable planning and understanding. With proper planning, and perhaps with specially skilled people to assist in certain areas, the migration can usually be accomplished in an orderly way.
How is RACF used to protect system resources?
RACF protects resources by granting access only to authorized users of the protected resources. RACF retains information about users, resources, and access authorities in special structures called profiles in its database, and it refers to these profiles when deciding which users should be permitted access to protected system resources.
What do you need to know about RACF macros?
Allow applications to use the RACF macros RACF uses a user ID and a system-encrypted password to perform its user identification and verification. The user ID identifies the person to the system as a RACF user. The password verifies the user’s identity.