Security definitions
Customize and submit the FEKRACF
sample member
in the FEK.#CUST.JCL
data set, which has sample RACF® and z/OS® UNIX commands
to create the basic security definitions for z/OS Explorer.
Note: For those sites that use ACF2™ for z/OS or Top Secret®
for z/OS, go to Broadcom Support Portal (https://support.broadcom.com/) and check for the related IBM
Rational Developer for System z Knowledge Document. This Knowledge Document has details on the
security commands that are necessary to properly configure IBM® Explorer for z/OS, as z/OS Explorer has the same
requirements as Rational Developer for System z.
To complete the security setup, the security administrator must know the values listed in the
following table. These values were defined during the previous steps of the installation and
customization of IBM Explorer for z/OS.
Description | Default value | Where to find the answer |
---|---|---|
z/OS Explorer product high-level qualifier |
|
|
z/OS Explorer customization high-level qualifier |
|
|
JES Job Monitor started task name |
|
|
RSE daemon started task name |
|
|
After the security setup is completed, the cryptographic administrator must customize and submit the FEKPKCS1 sample member in the FEK.#CUST.JCL data set, which will create a PKCS#11 private key for usage by SAF JSON Web tokens (JWTs).
To complete the cryptographic setup, the cryptographic administrator must know the values that are listed in the following table. These values are defined during the security setup of z/OS Explorer.
Description | Default value | Where to find the answer |
---|---|---|
PKCS#11 token name |
|