/
z/OS Installation - Configuration of Security
z/OS Installation - Configuration of Security
Introduction
Some Universal Agent components utilize z/OS security services to control access to product functions and resources. These pages describe the installation steps to activate product security and define resource controls.
Note
The use of the security resource is optional. If you do not want to use it at this time, this information can be skipped.
Detailed Information
The following pages specify the configuration methods for IBM's RACF and Computer Associate's ACF2 security products:
, multiple selections available,
Related content
Configuration of Security - ACF2 Class
Configuration of Security - ACF2 Class
Read with this
Installation Requirements and Summary - z/OS
Installation Requirements and Summary - z/OS
More like this
Configuration of Security - RACF Class
Configuration of Security - RACF Class
Read with this
z/OS Installation - Configuration
z/OS Installation - Configuration
More like this
Configuration of Security - Universal Command Security
Configuration of Security - Universal Command Security
Read with this
z/OS Installation - Installation Requirements
z/OS Installation - Installation Requirements
More like this