/
z/OS Installation - Configuration of Security
z/OS Installation - Configuration of Security
Introduction
Some Universal Agent components utilize z/OS security services to control access to product functions and resources. These pages describe the installation steps to activate product security and define resource controls.
Note
The use of the security resource is optional. If you do not want to use it at this time, this information can be skipped.
Detailed Information
The following pages specify the configuration methods for IBM's RACF and Computer Associate's ACF2 security products:
, multiple selections available,
Related content
Configuration of Security - RACF Class
Configuration of Security - RACF Class
Read with this
z/OS Installation - Configuration of Security
z/OS Installation - Configuration of Security
More like this
Configuration of Security - Universal Command Security
Configuration of Security - Universal Command Security
Read with this
z/OS Installation - Configuration of Security
z/OS Installation - Configuration of Security
More like this
z/OS Installation - Configuration of Security
z/OS Installation - Configuration of Security
More like this
z/OS Installation - Configuration of Security
z/OS Installation - Configuration of Security
More like this