Previous topic |
Next topic |
Contents |
Contact z/OS |
Library |
PDF
ISMF functions you might want to protect z/OS DFSMSdss Storage Administration SC23-6868-01 |
|
Program control allows you to determine the ISMF functions to which users have access. The authorization scheme you set up can apply to both individual users and user groups. The ISMF functions you can protect fall into two general categories: line operators and commands. With program control, you can set up authorization levels for each
category. You can also vary the level within a category to suit the
needs of your site. Before you set up an authorization structure,
consider the following:
|
Copyright IBM Corporation 1990, 2014
|