EditWYSIWYGAttach PDF Raw View►More Actions▼More Actions

Restore topic to revision: You will be able to review the topic before saving it to a new revision

Copy text and form data to a new topic (no attachments will be copied though).
Name of copy:
You will be able to review the copied topic before saving

Rename/move topic... scans links in all public webs (recommended)
Rename/move topic... scans links in CBI_ComputerSecurity web only
Delete topic... scans links in all public webs (recommended)
Delete topic... scans links in CBI_ComputerSecurity web only

Revision Date Username Comment
1212 Nov 2014 - 15:25ThomasMisa 
1122 Jul 2014 - 16:04ThomasMisa 
1022 Jul 2014 - 16:02ThomasMisa 
903 Oct 2013 - 15:55norqu036? 
818 Jun 2013 - 11:43NicLewis 
724 Apr 2013 - 11:18NicLewis 
616 Apr 2013 - 09:37NicLewis 
528 Mar 2013 - 09:33ThomasMisa 
413 Mar 2013 - 09:44NicLewis 
308 Mar 2013 - 08:17NicLewis 
earlier first

Render style:     Context:

 History: r12 | r5 < r4 < r3 < r2
[X] Hide this message.
Notice: On June 30, 2016, UMWiki service will be decommissioned. If you have information in UMWIki that needs to be preserved, you should make plans to move it before that date. Google Sites is anticipated to be the most popular and appropriate alternative for users because it offers a more modern and user-friendly interface and unlimited capacity. To learn more about the features of Google Sites and other alternatives, and to identify which one best fits your needs, see the University’s Website Solution Selection Guide. If you have concerns or would like help regarding this change and your options, please contact Technology Help at help@umn.edu
You are here: UMWiki>CBI_ComputerSecurity Web>Systems>SystemsIBMRACF (revision 3)



Introduced in 1976, Resource Access Control Facility (RACF) is an IBM mainframe security software product that provides access control and auditing functionality for the z/OS and z/VM operating systems. A competitor to CA Technology's ACF2 , the RACF software is a corporate product that allows customers to tailor their control over the securing of valuable data, and the administration of user access on the operating system, depending upon the customer's security goals. The concept behind RACF is to provide sensitive files with the least possible access privileges, and to allow unusual use of resources only with the approval of an administrator, and the owner of the resource. To that end, RACF employs protection mechanisms called "logical access controls" to restrict user access to information appropriate for them. To determine the appropriate level of each user's access, authorized user information and their access privileges are stored in a profiles database, which the system queries to determine access privileges during a resource request. RACF has undergone continual development from 1976 to the present, achieving the TCSEC C1 level of trust in 1984, C2 in 1985, and the B1 level of trust in 1990.


-- Main.lewi0740 - 21 Nov 2012

Topic attachments
I Attachment Action SizeSorted ascending Date Who Comment
pdfpdf ibm-racf--the-history-of-racf.pdf manage 508.0 K 21 Feb 2013 - 09:34 NicLewis History of IBM RACF
Edit | WYSIWYG | Attach |  PDF |  History: r12 | r5 < r4 < r3 < r2 |  Backlinks |  Raw View | More topic actions...
Topic revision: r3 - 08 Mar 2013 - 08:17:34 - NicLewis
Signed in as lewi0740 (NicLewis) | Sign out
UMWiki UMWiki
This site is powered by FoswikiCopyright © by the contributing authors. All material on this collaboration platform is the property of the contributing authors.
Ideas, requests, problems regarding UMWiki? Send feedback