IBM Z Workload Scheduler API and RACF
IBM Z Workload Scheduler performs security checking at the Z controller for all transaction programs (TP) that use the API.
To establish a conversation, the outbound TP must supply a user_id
and
password, and optionally a profile that indicates the RACF® user group. The user_id
must
have access to the IBM Z Workload Scheduler subsystem
resource, which is defined in the APPL class.
A user needs this access to fixed resources for API requests:
- GET
- CP read. SR read is also required to retrieve special resource information.
- PUT
- CP update. RL update is required to change the status of operations or issue ready list commands such as MH or NOP. EXEC update is required to use the EXEC command.
- DEL
- CP update.
- CREATE
- IBM Z Workload Scheduler does not support security checking for CREATE requests because a request could be directed to more than one IBM Z Workload Scheduler subsystem where security rules differ. You can prevent unauthorized use of CREATE requests through APPC security mechanisms by protecting the LU and the TP name.
If you protect IBM Z Workload Scheduler data by specifying subresources, users must have the appropriate access to subresources. Table 1 shows the subresources that you can specify for each fixed resource.