| Line 9: |
Line 9: |
| | * CICS | | * CICS |
| | * DB2 | | * DB2 |
| | + | |
| | + | === Sistema Pasivo === |
| | + | * Por defecto NO PROTEGE NADA |
| | + | * Se deben definir los usuarios y recursos lógicos |
| | + | * Se consulta con SAF (Security Access Facility) y macros de RACF (RACROUTE) |
| | + | * Implementable en fases |
| | + | * Administración centralizada con cierto grado de descentralización. |
| | + | |
| | + | == Capabilities == |
| | + | * DCE Security Server |
| | + | ** Distributed Computing Enviroment para OS/390 |
| | + | *** Kerberos V5 con V2,R5 |
| | + | * OS/390 Firewall Technologies Support (V2,R5) |
| | + | ** FTP Proxy Support y SOCKETS Daemon Support |
| | + | ** Secureway Communications Server para OS/390 |
| | + | * LDAP Server (V2,R5) |
| | + | ** Lightweight Directory Access Protocol |
| | + | * Open Cryptographic Enhanced Plugins - OCEP (V2,R8) |
| | + | * Network Authentication and Privacy Service (V2,R10) |
| | + | ** Kerberos V5 Authentication Support |