Implementing security
This chapter explains how you use IBM® Z Workload Scheduler security features to protect IBM® Z Workload Scheduler functions and data.
Before you use IBM® Z Workload Scheduler security features, you must define and enable the security environment. For details, see IBM Z Workload Scheduler: Planning and Installation.