Setting up security
This section describes how to set up security for RUV.
In many processes that RUV performs, update access to secured files is required. If your site uses a security package, you may need to alter access availability for users who submit backups or other processing requests. You must ensure that all jobs which perform logging have access to the journal and log data sets.
RUV components, especially repository data sets, often require security beyond the security that is provided by the system security manager. The system security manager is typically compatible with the Resource Access Control Facility (RACF).
RACF/ACF2 requirements should be documented for the IEESYS process that is used by the BLDINDEX function.
For information about the correct procedure for defining a user ID for a started task in your environment, see your security system (RACF/ACF2) manual. The IEESYSAS associated address space has its security profile propagated from the address space that spawns it, and it has the same access as the spawning address space.
The ISPF interface can run in INQUIRE mode or UPDATE mode. Mode selection is determined at execution by preestablished RACF authorization to the subsystem data sets (REGISET and REGISET2).
This section contains the following topics: