You configure z/OS® IP security
using an extensive set of configuration statements and parameters
coded into a flat file, which is parsed by the Policy Agent to establish
the set of IP security requirements for each TCP/IP stack. IBM® provides two alternatives for
creating the Policy Agent configuration files: