Previous Topic

Next Topic

Book Contents

Book Index

Security Implementation

INCONTROL products can be protected just like any other data center application. IOA has built‑in interfaces to widely used security environments, such as RACF, CA‑ACF2 and CA‑TOP SECRET. Each IOA function is associated with a security module. These security modules are used to check user authorization for requested actions, and to permit or deny the actions accordingly. User exits are invoked before the security modules to allow the user to perform required user functions that are not related to security.

For a detailed description of IOA security, see the INCONTROL for z/OS Security Guide.

Parent Topic

Miscellaneous