RACF authorization of started-task procedures
Some IBM MQ data sets are for the exclusive use of the queue manager. If you protect the IBM MQ data sets using RACF, we must also authorize the queue manager started-task procedure xxxxMSTR, and the distributed queuing started-task procedure xxxxCHIN, using RACF. To do this, use the STARTED class. Alternatively, we can use the started procedures table (ICHRIN03), but then we must perform an IPL of our z/OS system before the changes take effect.
For more information, see the z/OS Security Server RACF System Programmer's Guide.
The RACF user ID identified must have the required access to the data sets in the started-task procedure. For example, if you associate a queue manager started task procedure called CSQ1MSTR with the RACF user ID QMGRCSQ1, the user ID QMGRCSQ1 must have access to the z/OS resources accessed by the CSQ1 queue manager.
Also, the content of the GROUP field in the user ID of the queue manager must be the same as the content of the GROUP field in the STARTED profile for that queue manager. If the content in each GROUP field does not match then the appropriate user ID is prevented from entering the system. This situation causes IBM MQ to run with an undefined user ID and consequently close due to a security violation.
The RACF user IDs associated with the queue manager and channel initiator started task procedures must not have the TRUSTED attribute set.
Parent topic: Set up IBM MQ for z/OS data set security