Requirements and checklist

To complete the security setup, the security administrator must know the values that are listed in Table 1. These values were defined during previous steps of the installation and customization of z/OS® Explorer.
Table 1. Security setup variables
Description
  • Default value
  • Where to find the answer
Value
z/OS Explorer product high-level qualifier
  • FEK
  • SMP/E installation
 
z/OS Explorer customization high-level qualifier  
JES Job Monitor started task name  
RSE daemon started task name  
Application ID  
The following list is an overview of the actions that are required to complete the basic security setup of z/OS Explorer. As documented in the following sections, different methods can be used to fulfill these requirements, depending on the required security level. For information about the security setup of optional z/OS Explorer services, see the previous sections.

To complete the cryptographic setup, the cryptographic administrator must know the values that are listed in the following table. These values are defined during the security setup of z/OS Explorer.

Table 2. Cryptographic setup variables
Description
  • Default value
  • Where to find the answer
Value
PKCS#11 token name