Example tasks: security

This topic provides examples of typical security setup tasks that you can use as a model for your own.

Here are some general points that apply to all of the RACF® examples:

We're going to start by creating some RACF profiles to protect all CICSPlex SM functions and resources. When we've done this, we'll permit access selectively to particular users of particular resources.