Planning security implementation
Consider the tasks in this section when determining your security requirements.
About this task
| Task | Reference |
|---|---|
| Topic | |
| How IBM® Z Workload Scheduler verifies access. | How IBM Z Workload Scheduler verifies access authority |
| Determine which user IDs require access to IBM® Z Workload Scheduler. | Identifying users |
| Establish naming conventions for IBM® Z Workload Scheduler resources. | Establishing naming conventions for IBM Z Workload Scheduler resources |
| Group RACF® users and resources. | Grouping RACF users and resources |
| Review general security considerations. | General security considerations |
Determine if you use a centralized
or decentralized strategy. Your strategy determines to some extent
the levels of protection you need:
|
Examples of security strategies |
| Controlling access to the IBM Z Workload Scheduler subsystem | |
| Controlling access to IBM Z Workload Scheduler fixed resources | |
| Controlling access to IBM Z Workload Scheduler subresources | |
| Review API security and access requirements if you use the API from your own TP or through the Dynamic Workload Console. | Controlling access to IBM Z Workload Scheduler from APPC |
| Review security and access requirements if you use Dynamic Workload Console. | Controlling access to IBM Z Workload Scheduler using Dynamic Workload Console |
| Review access requirements for IBM® Z Workload Scheduler TSO commands. | Controlling access through TSO commands |
When you have determined your security requirements, implement security access:
| Task | Reference |
|---|---|
| Topic | |
Verify that the environment is set up. Ensure that
you have:
|
Refer to IBM® Z Workload Scheduler Planning and Installation |
| Specify access to the subsystem. | Controlling access to the IBM Z Workload Scheduler subsystem |
| Specify fixed resources. | Controlling access to IBM Z Workload Scheduler fixed resources |
| Specify subresources. | Controlling access to IBM Z Workload Scheduler subresources |
| Implement security access through the IBM® Z Workload Scheduler API, if you use this function. | Controlling access to IBM Z Workload Scheduler from APPC |
| Implement security access through the IBM® Z Workload Scheduler server, if you use this function. | Controlling access to IBM Z Workload Scheduler from APPC |
| Specify subresources on the AUTHDEF statement. | AUTHDEF |
| Specify resource names on the AUDIT statement, if you need audit information. | AUDIT |