Protection of data and resources

Each user request to access a function or to access data is validated by SAF. This is some of the information that can be protected:
  • Calendars and periods
  • Job stream names or job stream owner, by name
  • Workstation, by name
  • Job stream-specific data in the plan
  • Operator instructions
  • JCL
To support distributed, multi-user handling, IBM® Z Workload Scheduler lets you control the level of security you want to implement, right down to the level of individual records. You can define generic or specific RACF® resource names to extend the level of security checking.

If you have RACF Version 2 Release 1 installed, you can use the IBM Z Workload Scheduler reserved resource class to manage your IBM Z Workload Scheduler security environment. This means that you do not have to define your own resource class by modifying RACF and restarting your system.