z/OS Installation - Configuration of Security
Introduction
Some Universal Agent components utilize z/OS security services to control access to product functions and resources. These pages describe the installation steps to activate product security and define resource controls.
Note
The use of the security resource is optional. If you do not want to use it at this time, this information can be skipped.
Detailed Information
The following pages specify the configuration methods for IBM's RACF and Computer Associate's ACF2 security products: