Different levels of authority and RACF attributes allow you to issue different types of RACF commands. In this article we will see which RACF commands one can issue with each level of authority and attributes.
System Special or Group Special Attribute
Command | Operands |
---|---|
ADDSD | With all operands |
ADDGROUP | With all operands |
ADDUSER | With all operands, but for group-SPECIAL user only when user also has CLAUTH(USER) |
ALTDSD | With all operands except GLOBALAUDIT |
ALTGROUP | With all operands |
ALTUSER | With all operands except UAUDIT or NOUAUDIT. Also, you must have the SPECIAL attribute to use the NOEXPIRED operand or to issue the NOCLAUTH operand for a class name that is not in the class descriptor table (group-SPECIAL does not suffice). |
CONNECT | With all operands |
DELDSD | With all operands |
DELGROUP | With all operands |
DELUSER | With all operands |
LISTDSD1 | With all operands |
LISTGRP | With all operands |
LISTUSER | With all operands |
PASSWORD or PHRASE | With all operands |
PERMIT | With all operands |
RALTER | With all operands except GLOBALAUDIT |
RACDCERT | With all operands. You must have the SPECIAL attribute to issue the RACDCERT command. Group-SPECIAL does not suffice. |
RACLINK | With all operands |
RACMAP | With all operands. You must have the SPECIAL attribute to issue the RACMAP command. Group-SPECIAL does not suffice. |
RDEFINE | With all operands |
RDELETE | With all operands |
REMOVE | With all operands |
RLIST | With all operands |
SEARCH | With all operands |
SETROPTS | With all operands except AUDIT, NOAUDIT, CMDVIOL, NOCMDVIOL, APPLAUDIT, NOAPPLAUDIT, LOGOPTIONS, OPERAUDIT, NOOPERAUDIT, SAUDIT, NOSAUDIT, SECLABELAUDIT, NOSECLABELAUDIT, SECLEVELAUDIT, and NOSECLEVELAUDIT, which require the AUDITOR attribute. Users with the group-SPECIAL attribute can only issue REFRESH GENERIC and LIST. |
System Auditor or Group Auditor Attribute
Command | Operands |
---|---|
ALTDSD | Only with GLOBALAUDIT |
ALTUSER | Only with UAUDIT or NOUAUDIT |
LISTDSD | With all operands, lists GLOBALAUDIT option |
LISTGRP | With all operands |
LISTUSER | With all operands, lists UAUDIT or NOUAUDIT operand |
RALTER | Only with GLOBALAUDIT |
RLIST | With all operands, lists GLOBALAUDIT option |
SEARCH | With all operands |
SETROPTS | Only with APPLAUDIT, NOAPPLAUDIT, AUDIT, NOAUDIT, CMDVIOL, NOCMDVIOL, LOGOPTIONS, OPERAUDIT, NOOPERAUDIT, SAUDIT, NOSAUDIT, SECLABELAUDIT, NOSECLABELAUDIT, SECLEVELAUDIT, NOSECLEVELAUDIT, LIST, REFRESH GENERIC, or REFRESH RACLIST |
System Operations or Group Operations Attribute
Command | Operands |
---|---|
ADDSD | When adding new profiles for group data sets |
LISTDSD | With all operands except GLOBALAUDIT |
RLIST | With all operands except GLOBALAUDIT |
SEARCH | With all operands |
SETROPTS | Only with REFRESH |
CLAUTH Attribute
Command | Operands |
---|---|
ADDUSER1 | With all operands except OPERATIONS, NOOPERATIONS, SPECIAL, NOSPECIAL, AUDITOR or NOAUDITOR |
ALTUSER2 | Only with CLAUTH or NOCLAUTH |
RALTER3 | Only with ADDVOL |
RDEFINE4 | With all operands (special rules apply to ADDMEM) |
Notes:
- When you have the CLAUTH attribute of USER and you either are the owner of a group, have JOIN authority in the default group specified in the command, or the profile is within the scope of a group in which you have the group special attribute.
- When you have the CLAUTH attribute for the class to be added or deleted, the class name is in the class descriptor table (CDT), and either you are the owner of the user’s profile, or the profile is within the scope of a group in which you have the group special attribute.
- When you have the CLAUTH attribute of TAPEVOL and you also have sufficient authority to issue the command. For ADDMEM, special rules apply, depending on access to individual resources.
- When you have the CLAUTH attribute for the specified class. For ADDMEM, special rules apply, depending on access to individual resources.
Group Authority
Group authorities | Commands and Operands |
---|---|
USE | For group resources, the authority allowed the group. |
CREATE |
|
CONNECT |
|
JOIN |
|
Notes:
- This command applies to group data sets only.
- This command applies to the superior group.
- This command applies only if you have the JOIN group authority in the default group specified in the ADDUSER command and if you also have the CLAUTH(USER) attribute.
- This command applies to current and new superior groups. You can have JOIN authority in one group and be owner of or be connected with the group special attribute to another group.
Access Authority
Access authorities | Commands and Operands |
---|---|
NONE |
None |
READ |
|
ALTER |
|
Notes:
- This command applies to discrete profiles only.
- This command applies to ADDVOL operand only if you also have CLAUTH attribute for TAPEVOL.
Profile Ownership Authority
Owner of RACF profile | Commands and Operands |
---|---|
Owner of user profile |
|
Owner of group profile |
|
Owner of resource profile |
|
Notes:
- This command applies to CLAUTH or NOCLAUTH only if you have the CLAUTH attribute for the class to be added or deleted, and the class name is in the class descriptor table (CDT).
- This command applies to the superior group.
- This command applies to the default group specified and only if you have the CLAUTH attribute of USER.
- This command applies to current and new superior groups. You can have JOIN authority in one group and be owner of another group.
- This command applies to the superior group or group to be deleted.
- This command applies to the ADDVOL operand only when you also have CLAUTH attribute of TAPEVOL.
Other Authorities
User ID relationship | Commands and Operands |
---|---|
User ID is current user |
|
User ID is high-level qualifier of data set name (or qualifier supplied by a command installation exit) |
|
None |
|
None | RACF MVS Operator Commands:
|
Note:
- Although no special authority is needed to issue this command, the system operator must supply the appropriate RVARY password, as established by the SETROPTS command with the RVARYPW operand, to approve any change in RACF status.
You can get more information about this subject in the IBM’s manual “z/OS Security Server RACF Security Administrator’s Guide”.
Be the first to comment