Accessing unauthorized z/OS native WLM services on Liberty
To enable access to unauthorized z/OS® native WLM
services, you use the Liberty
zosWlm-1.0 feature, and enable Liberty to use the native LE WLM services, such
as ConnectWorkMgr, createWorkUnit,
deleteWorkUnit, extractWorkUnit, joinWorkUnit and
leaveWorkUnit.
Before you begin
For code examples, and for information about configuration syntax, classification rules, and the attributes of the
httpClassification element, see WLM classification for z/OS.
Procedure
-
Enable the Liberty
zosWlm-1.0feature. -
Define a security profile for the FACILITY class and profile "BPX.WLMSERVER" that allows the
user associated with the server READ access.
This enables the Liberty server to use the native LE WLM services, such as
ConnectWorkMgr,createWorkUnit,deleteWorkUnit,extractWorkUnit,joinWorkUnitandleaveWorkUnit.
Example
The "subsystem name" used for classifying work requests
is BBGZSRV, and it is specified on the WLM Connect
Service ConnectWorkMgr.
The
collectionName is supplied as the "COLLECTION" value on the Classify work (__server_classify).
This example shows how the value used for the collectionName can be specified: <zosWorkloadManager collectionName="AbcDef1234"/>Note: The
collectionName supports mixed case.Note: The
collectionName only uses the first 18
characters.Note: If no value is specified, the value ${wlp.server.name} is used. This is the directory name
of the server.