Controlling access to IBM Z Workload Scheduler subresources
You can restrict access to IBM Z Workload Scheduler data by specifying subresources. This level of protection is useful if you want to permit different users access to a particular IBM Z Workload Scheduler function, while allowing the users' access only to their own IBM Z Workload Scheduler data. For example, a user might not need access to all applications, only to payroll applications.
If you do not specify subresources, access to IBM Z Workload Scheduler data
is determined by a user's access to fixed resources or, if fixed resources
are not defined, by the user's access to the IBM Z Workload Scheduler subsystem.
To implement specific protection of IBM Z Workload Scheduler data,
you must:
- Give users access to the fixed resource that owns the subresource.
- Add the subresource to the list of SUBRESOURCES on the AUTHDEF statement.
- Define to RACF® the RACF® resource name that corresponds to the IBM Z Workload Scheduler subresource name.
- Set up the required RACF® profile for the resource.
Protected fixed resources and subresources shows the subresources that you can protect.
If you change a profile for a subresource while IBM Z Workload Scheduler is
active, the change does not take effect immediately. Three ways to
effect the change are:
- Stop and restart IBM Z Workload Scheduler.
- Use the modify command (F xxxx,P=GEN followed by F xxxx,S=GEN) to stop and restart the general service subtask.
- Select Service Functions (item 9 on the IBM Z Workload Scheduler dialog main menu), and then select RACF® Resources.