Controlling access to IBM Z Workload Scheduler

IBM Z Workload Scheduler security involves three levels of protection:
  • The IBM Z Workload Scheduler subsystem determines if a user can establish communication with IBM Z Workload Scheduler.
  • Fixed resources protect functions in IBM Z Workload Scheduler; for example, modifying the current plan or requesting a backup of a resource data set.
  • Subresources protect IBM Z Workload Scheduler data.

The level of access given to a user at one level determines the default access that the user has at remaining levels. For example, if a user has update access to the IBM Z Workload Scheduler subsystem, then that user has, by default, update access to all fixed resources. A user's access to fixed resources in turn determines the default access to subresources. The default value is used when a resource has not been specifically protected.

If you use the IBM Z Workload Scheduler API, you can also use the security functions of APPC to protect access to the Z controller. See Controlling access to IBM Z Workload Scheduler from APPC, for more information.

Carefully review your security requirements, and specify the levels of protection that you require. Do not specify extra levels of protection if they are not needed.