z/OS Installation - Configuration of Security

Introduction

Some Universal Agent components utilize z/OS security services to control access to product functions and resources. These pages describe the installation steps to activate product security and define resource controls.


Note

The use of the security resource is optional. If you do not want to use it at this time, this information can be skipped.

Detailed Information

The following pages specify the configuration methods for IBM's RACF and Computer Associate's ACF2 security products: