This document is about the IBM z/OS 2.4 Security Server RACF Security Administrator's Guide. It describes how to use RACF to meet security needs, including user identification and verification, authorization checking, logging and reporting, and user accountability.