Requirements and checklist
To complete the security setup, the security administrator must know the values that are listed
in Table 1. These values were defined during previous steps of
the installation and customization of z/OS® Explorer.
Description |
|
Value |
---|---|---|
z/OS Explorer product high-level qualifier |
|
|
z/OS Explorer customization high-level qualifier |
|
|
JES Job Monitor started task name |
|
|
RSE daemon started task name |
|
|
Application ID |
|
The following list is an overview of the actions that are required to complete the basic security
setup of z/OS Explorer. As
documented in the following sections, different methods can be used to fulfill these requirements,
depending on the required security level. For information about the security
setup of optional z/OS Explorer services, see the previous sections.
- Activate the security settings and classes
- Define an OMVS segment for z/OS Explorer users
- Define the z/OS Explorer started tasks
- Server security
- Define RSE as a secure z/OS UNIX server
- Define the MVS program controlled libraries for RSE
- Define the PassTicket support for RSE
- Define the application protection for RSE
- Define z/OS UNIX permissions for RSE
- Define SAF JSON Web Token (JWT) support for RSE
- Define the JES command security
- Define the data set profiles
- Verify the security settings
To complete the cryptographic setup, the cryptographic administrator must know the values that are listed in the following table. These values are defined during the security setup of z/OS Explorer.
Description |
|
Value |
---|---|---|
PKCS#11 token name |
|